Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-3695 (GCVE-0-2016-3695)
Vulnerability from cvelistv5
Published
2017-12-29 15:00
Modified
2024-08-06 00:03
Severity ?
EPSS score ?
Summary
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/102327 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1322755 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102327 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1322755 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | Issue Tracking, Patch, Third Party Advisory |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T00:03:34.473Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1322755", }, { name: "102327", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/102327", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-03-16T00:00:00", descriptions: [ { lang: "en", value: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-02T10:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1322755", }, { name: "102327", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/102327", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2016-3695", datePublished: "2017-12-29T15:00:00", dateReserved: "2016-03-30T00:00:00", dateUpdated: "2024-08-06T00:03:34.473Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n einj_error_inject en drivers/acpi/apei/einj.c en el kernel de Linux permite que usuarios locales simulen errores de hardware y, consecuentemente, provoquen una denegaci\\u00f3n de servicio (DoS) aprovechando el error a la hora de deshabilitar la inyecci\\u00f3n de errores APEI mediante EINJ cuando est\\u00e1 establecido securelevel.\"}]", id: "CVE-2016-3695", lastModified: "2024-11-21T02:50:31.453", metrics: "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2017-12-29T15:29:00.580", references: "[{\"url\": \"http://www.securityfocus.com/bid/102327\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1322755\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/102327\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1322755\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}]", sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-74\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2016-3695\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-12-29T15:29:00.580\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.\"},{\"lang\":\"es\",\"value\":\"La función einj_error_inject en drivers/acpi/apei/einj.c en el kernel de Linux permite que usuarios locales simulen errores de hardware y, consecuentemente, provoquen una denegación de servicio (DoS) aprovechando el error a la hora de deshabilitar la inyección de errores APEI mediante EINJ cuando está establecido securelevel.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/102327\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1322755\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/102327\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1322755\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}", }, }
suse-su-2022:3809-1
Vulnerability from csaf_suse
Published
2022-10-31 08:28
Modified
2022-10-31 08:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
- CVE-2020-16119: Fixed a use-after-free due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released (bnc#1177471).
- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).
- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-2503: Fixed a LoadPin bypass in Dm-verity (bnc#1202677).
- CVE-2022-2586: Fixed issue in netfilter that allowed CHAIN_ID to refer to another table (bsc#1202095).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-3169: Fixed a denial of service that resulted in a PCIe link disconnect (bnc#1203290).
- CVE-2022-32296: Fixed issue where TCP servers were able to identify clients by observing what source ports are used (bnc#1200288).
- CVE-2022-3239: Fixed a use-after-free in the video4linux driver (bnc#1203552).
- CVE-2022-3303: Fixed a race at SNDCTL_DSP_SYNC (bsc#1203769).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-40768: Fixed information leak in drivers/scsi/stex.c due to stex_queuecommand_lck lack a memset for the PASSTHRU_CMD case (bnc#1203514).
- CVE-2022-41218: Fixed a use-after-free due to refcount races at releasing (bsc#1202960).
- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).
- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).
- CVE-2022-41848: Fixed a use-after-free in mgslpc_ops (bsc#1203987).
- CVE-2022-41849: Fixed a use-after-free in ufx_ops_open() (bsc#1203992).
- CVE-2022-42719: Fixed MBSSID parsing use-after-free (bsc#1204051).
- CVE-2022-42720: Fixed BSS refcounting bugs (bsc#1204059).
- CVE-2022-42721: Avoid nontransmitted BSS list corruption (bsc#1204060).
- CVE-2022-42722: Fixed crash in beacon protection for P2P-device (bsc#1204125).
The following non-security bugs were fixed:
- Fixed parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- acpi: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- acpi: LPSS: Fix missing check in register_device_clock() (git-fixes).
- acpi: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- acpi: processor idle: Practically limit 'Dummy wait' workaround to old Intel systems (bnc#1203802).
- acpi: processor: Remove freq Qos request for all CPUs (git-fixes).
- acpi: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- acpi: video: Force backlight native for some TongFang devices (git-fixes).
- alsa: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).
- alsa: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- alsa: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).
- alsa: hda/cirrus - support for iMac 12,1 model (git-fixes).
- alsa: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- alsa: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- alsa: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).
- alsa: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).
- alsa: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).
- alsa: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo L140PU (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- alsa: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).
- alsa: hda/realtek: Add quirk for HP Dev One (git-fixes).
- alsa: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- alsa: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).
- alsa: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).
- alsa: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- alsa: hda/realtek: Add quirk for the Framework Laptop (git-fixes).
- alsa: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).
- alsa: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).
- alsa: hda/realtek: Fix deadlock by COEF mutex (git-fixes).
- alsa: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).
- alsa: hda/realtek: Re-arrange quirk table entries (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).
- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- alsa: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).
- alsa: hda/sigmatel: Keep power up while beep is enabled (git-fixes).
- alsa: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).
- alsa: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).
- alsa: info: Fix llseek return value when using callback (git-fixes).
- alsa: seq: Fix data-race at module auto-loading (git-fixes).
- alsa: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- alsa: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).
- alsa: usb-audio: Inform the delayed registration more properly (git-fixes).
- alsa: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- alsa: usb-audio: Register card again for iface over delayed_register option (git-fixes).
- alsa: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).
- alsa: usb-audio: fix spelling mistakes (git-fixes).
- arm64/mm: Validate hotplug range before creating linear mapping (git-fixes)
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)
- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)
- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)
- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)
- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)
- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes)
- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)
- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).
- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)
- arm64: mm: fix p?d_leaf() (git-fixes)
- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)
- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)
- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)
- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)
- arm: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).
- arm: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).
- arm: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).
- arm: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- asoc: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- asoc: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- asoc: codecs: da7210: add check for i2c_add_driver (git-fixes).
- asoc: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- asoc: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- asoc: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- asoc: nau8824: Fix semaphore unbalance at error paths (git-fixes).
- asoc: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- asoc: tas2770: Allow mono streams (git-fixes).
- asoc: tas2770: Reinit regcache on reset (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).
- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).
- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).
- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).
- blktrace: fix blk_rq_merge documentation (git-fixes).
- bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: gs_usb: gs_can_open(): fix race dev->can.state condition (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).
- ceph: do not truncate file in atomic_open (bsc#1202811).
- cgroup: Trace event cgroup id fields should be u64 (git-fixes).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).
- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).
- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).
- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- drm/amd/display: Limit user regamma to a valid value (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).
- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).
- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/amdgpu: use dirty framebuffer helper (git-fixes).
- drm/gem: Fix GEM handle release errors (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/meson: Correct OSD1 global alpha value (git-fixes).
- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).
- drm/radeon: add a force flush to delay work when radeon (git-fixes).
- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.
- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).
- ehea: fix error return code in ehea_restart_qps() (git-fixes).
- enetc: Fix endianness issues for enetc_qos (git-fixes).
- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).
- fuse: Remove the control interface for virtio-fs (bsc#1203137).
- fuse: ioctl: translate ENOSYS (bsc#1203136).
- fuse: limit nsec (bsc#1203135).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- hid: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).
- hid: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).
- hid: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).
- hid: wacom: Do not register pad_input for touch switch (git-fixes).
- hid: wacom: Only report rotation for art pen (git-fixes).
- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).
- input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).
- input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).
- input: rk805-pwrkey - fix module autoloading (git-fixes).
- input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
- ipmi: ssif: initialize ssif_info->client early (git-fixes).
- ixgbevf: add correct exception tracing for XDP (git-fixes).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- jfs: fix GPF in diFree (bsc#1203389).
- jfs: fix memleak in jfs_mount (git-fixes).
- jfs: more checks for invalid superblock (git-fixes).
- jfs: prevent NULL deref in diFree (bsc#1203389).
- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).
- kabi: cgroup: Restore KABI of css_set (bsc#1201610).
- kbuild: do not create built-in objects for external module builds (jsc#SLE-24559 bsc#1202756).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (bsc#1181862 git-fixes).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages
- kernel-obs-build: include qemu_fw_cfg (boo#1201705)
- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.
- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).
- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).
- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).
- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).
- kexec_file: drop weak attribute from functions (bsc#1196444).
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kfifo: fix ternary sign extension bugs (git-fixes).
- kvm: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).
- kvm: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- kvm: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- kvm: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- kvm: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- kvm: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).
- kvm: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- kvm: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- kvm: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- kvm: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- kvm: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- kvm: x86: accept userspace interrupt only if no event is injected (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).
- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md-raid10: fix KASAN warning (git-fixes).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- md: call __md_stop_writes in md_stop (git-fixes).
- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).
- media: aspeed-video: ignore interrupts that are not enabled (git-fixes).
- media: coda: Add more H264 levels for CODA960 (git-fixes).
- media: coda: Fix reported H264 profile (git-fixes).
- media: dvb_vb2: fix possible out of bound access (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).
- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).
- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).
- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).
- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).
- net: cpsw: Properly initialise struct page_pool_params (git-fixes).
- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).
- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).
- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).
- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).
- net: enetc: Use pci_release_region() to release some resources (git-fixes).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).
- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).
- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).
- net: ethernet: ezchip: fix error handling (git-fixes).
- net: ethernet: ezchip: remove redundant check (git-fixes).
- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).
- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).
- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).
- net: fec_ptp: add clock rate zero check (git-fixes).
- net: hns: Fix kernel-doc (git-fixes).
- net: lantiq: fix memory corruption in RX ring (git-fixes).
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add support of XDP_REDIRECT action (bsc#1201310, jsc#PED-529).
- net: mana: Add the Linux MANA PF driver (bsc#1201309, jsc#PED-529).
- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: netcp: Fix an error message (git-fixes).
- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmicro: handle clk_prepare() failure during init (git-fixes).
- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).
- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).
- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- nfs: fix nfs_path in case of a rename retry (git-fixes).
- nfsd: Add missing NFSv2 .pc_func methods (git-fixes).
- nfsd: Clamp WRITE offsets (git-fixes).
- nfsd: Fix offset type in I/O trace points (git-fixes).
- nfsd: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nfsd: prevent integer overflow on 32 bit systems (git-fixes).
- nfsd: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- nfsv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).
- nfsv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).
- nfsv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).
- nfsv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- nfsv4: Fix races in the legacy idmapper upcall (git-fixes).
- nfsv4: Fix second deadlock in nfs4_evict_inode() (git-fixes).
- nfsv4: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).
- ntb: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvmet: Expose max queues to configfs (bsc#1201865).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- ocfs2: drop acl cache for directories too (bsc#1191667).
- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).
- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).
- of/device: Fix up of_dma_configure_id() stub (git-fixes).
- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).
- padata: introduce internal padata_get/put_pd() helpers (bsc#1202638).
- padata: make padata_free_shell() to respect pd's ->refcnt (bsc#1202638).
- parisc/sticon: fix reverse colors (bsc#1152489).
- parisc: parisc-agp requires SBA IOMMU driver (bsc#1152489)
- pci/acpi: Guard ARM64-specific mcfg_quirks (git-fixes).
- pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- pci: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- pci: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- pci: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- pci: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).
- pci: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- pci: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- pci: qcom: Fix pipe clock imbalance (git-fixes).
- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).
- pinctrl/rockchip: fix gpio device creation (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).
- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: define get_cycles macro for arch-override (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
- profiling: fix shift too large makes kernel panic (git-fixes).
- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).
- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- regulator: core: Clean up on enable failure (git-fixes).
- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).
- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).
- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.
- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.
- rpm/kernel-source.spec.in: simplify finding of broken symlinks 'find -xtype l' will report them, so use that to make the search a bit faster (without using shell).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: fix 2KB pgtable release race (git-fixes).
- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).
- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).
- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).
- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).
- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).
- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).
- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).
- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).
- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).
- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).
- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).
- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).
- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).
- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).
- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).
- scsi: lpfc: Remove unneeded result variable (bsc#1203939).
- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).
- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).
- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).
- scsi: mpt3sas: Fix use-after-free warning (git-fixes).
- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).
- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).
- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).
- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).
- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).
- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).
- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).
- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).
- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).
- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).
- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).
- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).
- scsi: smartpqi: Update LUN reset handler (bsc#1200622).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: Create uart_xmit_advance() (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).
- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- silence nfscache allocation warnings with kvzalloc (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).
- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).
- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- squashfs: fix divide error in calculate_skip() (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- struct ehci_hcd: hide new member (git-fixes).
- struct otg_fsm: hide new boolean member in gap (git-fixes).
- sunrpc: Clean up scheduling of autoclose (git-fixes).
- sunrpc: Do not call connect() more than once on a TCP socket (git-fixes).
- sunrpc: Do not dereference xprt->snd_task if it's a cookie (git-fixes).
- sunrpc: Do not leak sockets in xs_local_connect() (git-fixes).
- sunrpc: Fix READ_PLUS crasher (git-fixes).
- sunrpc: Fix misplaced barrier in call_decode (git-fixes).
- sunrpc: Prevent immediate close+reconnect (git-fixes).
- sunrpc: RPC level errors should set task->tk_rpc_status (git-fixes).
- sunrpc: Reinitialise the backchannel request buffers before reuse (git-fixes).
- sunrpc: fix expiry of auth creds (git-fixes).
- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).
- tee: optee: Fix incorrect page free bug (git-fixes).
- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).
- tty/serial: atmel: RS485 & ISO7816: wait for TXRDY before sending data (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).
- usb.h: struct usb_device: hide new member (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).
- usb: core: Fix RST error in hub.c (git-fixes).
- usb: core: Prevent nested device-reset calls (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).
- usb: dwc3: disable USB core PHY management (git-fixes).
- usb: dwc3: ep0: Fix delay status handling (git-fixes).
- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).
- usb: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).
- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).
- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).
- usb: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).
- usb: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).
- usb: dwc3: gadget: Remove unnecessary checks (git-fixes).
- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).
- usb: dwc3: gadget: Store resource index of start cmd (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings.
- usb: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: u_audio: fix race condition on endpoint stop (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: otg-fsm: Fix hrtimer list corruption (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- usb: serial: ch341: fix lost character on LCR updates (git-fixes).
- usb: serial: ch341: name prescaler, divisor registers (git-fixes).
- usb: serial: cp210x: add Decagon UCA device id (git-fixes).
- usb: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- usb: serial: option: add Quectel EM060K modem (git-fixes).
- usb: serial: option: add Quectel RM520N (git-fixes).
- usb: serial: option: add Quectel RM520N (git-fixes).
- usb: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).
- usb: serial: option: add support for OPPO R11 diag port (git-fixes).
- usb: storage: Add ASUS <0x0b05:0x1932> to IGNORE_UAS (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usb: typec: ucsi: Remove incorrect warning (git-fixes).
- usb: xhci-mtk: add a function to (un)load bandwidth info (git-fixes).
- usb: xhci-mtk: add only one extra CS for FS/LS INTR (git-fixes).
- usb: xhci-mtk: add some schedule error number (git-fixes).
- usb: xhci-mtk: fix issue of out-of-bounds array access (git-fixes).
- usb: xhci-mtk: get the microframe boundary for ESIT (git-fixes).
- usb: xhci-mtk: use @sch_tt to check whether need do TT schedule (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmci: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).
- vmci: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).
- vmci: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).
- vmci: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).
- vmci: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).
- vmci: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- vt: Clear selection before changing the font (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.
- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/xen: Remove undefined behavior in setup_features() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).
- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).
- xprtrdma: Fix cwnd update ordering (git-fixes).
Patchnames
SUSE-2022-3809,SUSE-SLE-Module-RT-15-SP3-2022-3809,SUSE-SUSE-MicroOS-5.1-2022-3809,SUSE-SUSE-MicroOS-5.2-2022-3809,openSUSE-Leap-Micro-5.2-2022-3809
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2020-16119: Fixed a use-after-free due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released (bnc#1177471).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-2503: Fixed a LoadPin bypass in Dm-verity (bnc#1202677).\n- CVE-2022-2586: Fixed issue in netfilter that allowed CHAIN_ID to refer to another table (bsc#1202095).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-3169: Fixed a denial of service that resulted in a PCIe link disconnect (bnc#1203290).\n- CVE-2022-32296: Fixed issue where TCP servers were able to identify clients by observing what source ports are used (bnc#1200288).\n- CVE-2022-3239: Fixed a use-after-free in the video4linux driver (bnc#1203552).\n- CVE-2022-3303: Fixed a race at SNDCTL_DSP_SYNC (bsc#1203769).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-40768: Fixed information leak in drivers/scsi/stex.c due to stex_queuecommand_lck lack a memset for the PASSTHRU_CMD case (bnc#1203514).\n- CVE-2022-41218: Fixed a use-after-free due to refcount races at releasing (bsc#1202960).\n- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-41848: Fixed a use-after-free in mgslpc_ops (bsc#1203987).\n- CVE-2022-41849: Fixed a use-after-free in ufx_ops_open() (bsc#1203992).\n- CVE-2022-42719: Fixed MBSSID parsing use-after-free (bsc#1204051).\n- CVE-2022-42720: Fixed BSS refcounting bugs (bsc#1204059).\n- CVE-2022-42721: Avoid nontransmitted BSS list corruption (bsc#1204060).\n- CVE-2022-42722: Fixed crash in beacon protection for P2P-device (bsc#1204125).\n\nThe following non-security bugs were fixed:\n\n- Fixed parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- acpi: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- acpi: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- acpi: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- acpi: processor idle: Practically limit 'Dummy wait' workaround to old Intel systems (bnc#1203802).\n- acpi: processor: Remove freq Qos request for all CPUs (git-fixes).\n- acpi: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- acpi: video: Force backlight native for some TongFang devices (git-fixes).\n- alsa: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- alsa: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- alsa: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- alsa: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- alsa: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- alsa: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- alsa: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- alsa: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).\n- alsa: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).\n- alsa: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).\n- alsa: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo L140PU (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- alsa: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- alsa: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- alsa: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- alsa: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- alsa: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).\n- alsa: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- alsa: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- alsa: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- alsa: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).\n- alsa: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).\n- alsa: hda/realtek: Fix deadlock by COEF mutex (git-fixes).\n- alsa: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).\n- alsa: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- alsa: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).\n- alsa: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).\n- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- alsa: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- alsa: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).\n- alsa: hda/sigmatel: Keep power up while beep is enabled (git-fixes).\n- alsa: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).\n- alsa: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).\n- alsa: info: Fix llseek return value when using callback (git-fixes).\n- alsa: seq: Fix data-race at module auto-loading (git-fixes).\n- alsa: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- alsa: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- alsa: usb-audio: Inform the delayed registration more properly (git-fixes).\n- alsa: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- alsa: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- alsa: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- alsa: usb-audio: fix spelling mistakes (git-fixes).\n- arm64/mm: Validate hotplug range before creating linear mapping (git-fixes)\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)\n- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes)\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)\n- arm64: mm: fix p?d_leaf() (git-fixes)\n- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)\n- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)\n- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)\n- arm: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).\n- arm: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).\n- arm: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).\n- arm: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- asoc: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- asoc: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- asoc: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- asoc: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- asoc: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- asoc: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- asoc: nau8824: Fix semaphore unbalance at error paths (git-fixes).\n- asoc: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- asoc: tas2770: Allow mono streams (git-fixes).\n- asoc: tas2770: Reinit regcache on reset (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).\n- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).\n- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).\n- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).\n- blktrace: fix blk_rq_merge documentation (git-fixes).\n- bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).\n- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).\n- can: gs_usb: gs_can_open(): fix race dev->can.state condition (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).\n- ceph: do not truncate file in atomic_open (bsc#1202811).\n- cgroup: Trace event cgroup id fields should be u64 (git-fixes).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).\n- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).\n- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- drm/amd/display: Limit user regamma to a valid value (git-fixes).\n- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/amdgpu: use dirty framebuffer helper (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- ehea: fix error return code in ehea_restart_qps() (git-fixes).\n- enetc: Fix endianness issues for enetc_qos (git-fixes).\n- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- fuse: Remove the control interface for virtio-fs (bsc#1203137).\n- fuse: ioctl: translate ENOSYS (bsc#1203136).\n- fuse: limit nsec (bsc#1203135).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- hid: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- hid: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- hid: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).\n- hid: wacom: Do not register pad_input for touch switch (git-fixes).\n- hid: wacom: Only report rotation for art pen (git-fixes).\n- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).\n- input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- input: rk805-pwrkey - fix module autoloading (git-fixes).\n- input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: ssif: initialize ssif_info->client early (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (git-fixes).\n- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- jfs: fix GPF in diFree (bsc#1203389).\n- jfs: fix memleak in jfs_mount (git-fixes).\n- jfs: more checks for invalid superblock (git-fixes).\n- jfs: prevent NULL deref in diFree (bsc#1203389).\n- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).\n- kabi: cgroup: Restore KABI of css_set (bsc#1201610).\n- kbuild: do not create built-in objects for external module builds (jsc#SLE-24559 bsc#1202756).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (bsc#1181862 git-fixes).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kernel-obs-build: include qemu_fw_cfg (boo#1201705)\n- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.\n- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).\n- kexec_file: drop weak attribute from functions (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- kvm: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).\n- kvm: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- kvm: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- kvm: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- kvm: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- kvm: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).\n- kvm: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- kvm: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- kvm: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- kvm: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- kvm: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- kvm: x86: accept userspace interrupt only if no event is injected (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).\n- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- media: aspeed-video: ignore interrupts that are not enabled (git-fixes).\n- media: coda: Add more H264 levels for CODA960 (git-fixes).\n- media: coda: Fix reported H264 profile (git-fixes).\n- media: dvb_vb2: fix possible out of bound access (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).\n- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).\n- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).\n- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).\n- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).\n- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).\n- net: cpsw: Properly initialise struct page_pool_params (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).\n- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).\n- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).\n- net: ethernet: ezchip: fix error handling (git-fixes).\n- net: ethernet: ezchip: remove redundant check (git-fixes).\n- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).\n- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).\n- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).\n- net: fec_ptp: add clock rate zero check (git-fixes).\n- net: hns: Fix kernel-doc (git-fixes).\n- net: lantiq: fix memory corruption in RX ring (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bsc#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bsc#1201309, jsc#PED-529).\n- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: netcp: Fix an error message (git-fixes).\n- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).\n- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).\n- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- nfs: fix nfs_path in case of a rename retry (git-fixes).\n- nfsd: Add missing NFSv2 .pc_func methods (git-fixes).\n- nfsd: Clamp WRITE offsets (git-fixes).\n- nfsd: Fix offset type in I/O trace points (git-fixes).\n- nfsd: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nfsd: prevent integer overflow on 32 bit systems (git-fixes).\n- nfsd: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- nfsv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- nfsv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- nfsv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- nfsv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- nfsv4: Fix races in the legacy idmapper upcall (git-fixes).\n- nfsv4: Fix second deadlock in nfs4_evict_inode() (git-fixes).\n- nfsv4: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- ntb: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- ocfs2: drop acl cache for directories too (bsc#1191667).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- padata: introduce internal padata_get/put_pd() helpers (bsc#1202638).\n- padata: make padata_free_shell() to respect pd's ->refcnt (bsc#1202638).\n- parisc/sticon: fix reverse colors (bsc#1152489).\n- parisc: parisc-agp requires SBA IOMMU driver (bsc#1152489)\n- pci/acpi: Guard ARM64-specific mcfg_quirks (git-fixes).\n- pci: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- pci: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- pci: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- pci: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- pci: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- pci: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- pci: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- pci: qcom: Fix pipe clock imbalance (git-fixes).\n- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).\n- pinctrl/rockchip: fix gpio device creation (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: define get_cycles macro for arch-override (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).\n- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.\n- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.\n- rpm/kernel-source.spec.in: simplify finding of broken symlinks 'find -xtype l' will report them, so use that to make the search a bit faster (without using shell).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: fix 2KB pgtable release race (git-fixes).\n- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).\n- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).\n- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).\n- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).\n- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).\n- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).\n- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).\n- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).\n- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: smartpqi: Update LUN reset handler (bsc#1200622).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: Create uart_xmit_advance() (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).\n- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- silence nfscache allocation warnings with kvzalloc (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).\n- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).\n- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- squashfs: fix divide error in calculate_skip() (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- struct ehci_hcd: hide new member (git-fixes).\n- struct otg_fsm: hide new boolean member in gap (git-fixes).\n- sunrpc: Clean up scheduling of autoclose (git-fixes).\n- sunrpc: Do not call connect() more than once on a TCP socket (git-fixes).\n- sunrpc: Do not dereference xprt->snd_task if it's a cookie (git-fixes).\n- sunrpc: Do not leak sockets in xs_local_connect() (git-fixes).\n- sunrpc: Fix READ_PLUS crasher (git-fixes).\n- sunrpc: Fix misplaced barrier in call_decode (git-fixes).\n- sunrpc: Prevent immediate close+reconnect (git-fixes).\n- sunrpc: RPC level errors should set task->tk_rpc_status (git-fixes).\n- sunrpc: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- sunrpc: fix expiry of auth creds (git-fixes).\n- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).\n- tee: optee: Fix incorrect page free bug (git-fixes).\n- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tty/serial: atmel: RS485 & ISO7816: wait for TXRDY before sending data (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- usb.h: struct usb_device: hide new member (git-fixes).\n- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).\n- usb: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- usb: core: Fix RST error in hub.c (git-fixes).\n- usb: core: Prevent nested device-reset calls (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).\n- usb: dwc3: disable USB core PHY management (git-fixes).\n- usb: dwc3: ep0: Fix delay status handling (git-fixes).\n- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).\n- usb: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).\n- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).\n- usb: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).\n- usb: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).\n- usb: dwc3: gadget: Remove unnecessary checks (git-fixes).\n- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- usb: dwc3: gadget: Store resource index of start cmd (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings.\n- usb: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: u_audio: fix race condition on endpoint stop (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: otg-fsm: Fix hrtimer list corruption (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- usb: serial: ch341: fix lost character on LCR updates (git-fixes).\n- usb: serial: ch341: name prescaler, divisor registers (git-fixes).\n- usb: serial: cp210x: add Decagon UCA device id (git-fixes).\n- usb: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- usb: serial: option: add Quectel EM060K modem (git-fixes).\n- usb: serial: option: add Quectel RM520N (git-fixes).\n- usb: serial: option: add Quectel RM520N (git-fixes).\n- usb: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- usb: serial: option: add support for OPPO R11 diag port (git-fixes).\n- usb: storage: Add ASUS <0x0b05:0x1932> to IGNORE_UAS (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: ucsi: Remove incorrect warning (git-fixes).\n- usb: xhci-mtk: add a function to (un)load bandwidth info (git-fixes).\n- usb: xhci-mtk: add only one extra CS for FS/LS INTR (git-fixes).\n- usb: xhci-mtk: add some schedule error number (git-fixes).\n- usb: xhci-mtk: fix issue of out-of-bounds array access (git-fixes).\n- usb: xhci-mtk: get the microframe boundary for ESIT (git-fixes).\n- usb: xhci-mtk: use @sch_tt to check whether need do TT schedule (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmci: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).\n- vmci: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).\n- vmci: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).\n- vmci: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).\n- vmci: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).\n- vmci: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).\n- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).\n- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).\n- xprtrdma: Fix cwnd update ordering (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-3809,SUSE-SLE-Module-RT-15-SP3-2022-3809,SUSE-SUSE-MicroOS-5.1-2022-3809,SUSE-SUSE-MicroOS-5.2-2022-3809,openSUSE-Leap-Micro-5.2-2022-3809", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3809-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:3809-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20223809-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:3809-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html", }, { category: "self", summary: "SUSE Bug 1023051", url: "https://bugzilla.suse.com/1023051", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1177471", url: "https://bugzilla.suse.com/1177471", }, { category: "self", summary: "SUSE Bug 1179722", url: "https://bugzilla.suse.com/1179722", }, { category: "self", summary: "SUSE Bug 1179723", url: "https://bugzilla.suse.com/1179723", }, { category: "self", summary: "SUSE Bug 1181862", url: "https://bugzilla.suse.com/1181862", }, { category: "self", summary: "SUSE Bug 1185032", url: "https://bugzilla.suse.com/1185032", }, { category: "self", summary: "SUSE Bug 1191662", url: "https://bugzilla.suse.com/1191662", }, { category: "self", summary: "SUSE Bug 1191667", url: "https://bugzilla.suse.com/1191667", }, { category: "self", summary: "SUSE Bug 1191881", url: "https://bugzilla.suse.com/1191881", }, { category: "self", summary: "SUSE Bug 1192594", url: "https://bugzilla.suse.com/1192594", }, { category: "self", summary: "SUSE Bug 1194023", url: "https://bugzilla.suse.com/1194023", }, { category: "self", summary: "SUSE Bug 1194272", url: "https://bugzilla.suse.com/1194272", }, { category: "self", summary: "SUSE Bug 1194535", url: "https://bugzilla.suse.com/1194535", }, { category: "self", summary: "SUSE Bug 1196444", url: "https://bugzilla.suse.com/1196444", }, { category: "self", summary: "SUSE Bug 1197158", url: "https://bugzilla.suse.com/1197158", }, { category: "self", summary: "SUSE Bug 1197659", url: "https://bugzilla.suse.com/1197659", }, { category: "self", summary: "SUSE Bug 1197755", url: "https://bugzilla.suse.com/1197755", }, { category: "self", summary: "SUSE Bug 1197756", url: "https://bugzilla.suse.com/1197756", }, { category: "self", summary: "SUSE Bug 1197757", url: "https://bugzilla.suse.com/1197757", }, { category: "self", summary: "SUSE Bug 1197760", url: "https://bugzilla.suse.com/1197760", }, { category: "self", summary: "SUSE Bug 1197763", url: "https://bugzilla.suse.com/1197763", }, { category: "self", summary: "SUSE Bug 1197920", url: "https://bugzilla.suse.com/1197920", }, { category: "self", summary: "SUSE Bug 1198971", url: "https://bugzilla.suse.com/1198971", }, { category: "self", summary: "SUSE Bug 1199291", url: "https://bugzilla.suse.com/1199291", }, { category: "self", summary: "SUSE Bug 1200288", url: "https://bugzilla.suse.com/1200288", }, { category: "self", summary: "SUSE Bug 1200313", url: "https://bugzilla.suse.com/1200313", }, { category: "self", summary: "SUSE Bug 1200431", url: "https://bugzilla.suse.com/1200431", }, { category: "self", summary: "SUSE Bug 1200622", url: "https://bugzilla.suse.com/1200622", }, { category: "self", summary: "SUSE Bug 1200845", url: "https://bugzilla.suse.com/1200845", }, { category: "self", summary: "SUSE Bug 1200868", url: "https://bugzilla.suse.com/1200868", }, { category: "self", summary: "SUSE Bug 1200869", url: "https://bugzilla.suse.com/1200869", }, { category: "self", summary: "SUSE Bug 1200870", url: "https://bugzilla.suse.com/1200870", }, { category: "self", summary: "SUSE Bug 1200871", url: "https://bugzilla.suse.com/1200871", }, { category: "self", summary: "SUSE Bug 1200872", url: "https://bugzilla.suse.com/1200872", }, { category: "self", summary: "SUSE Bug 1200873", url: "https://bugzilla.suse.com/1200873", }, { category: "self", summary: "SUSE Bug 1201019", url: "https://bugzilla.suse.com/1201019", }, { category: "self", summary: "SUSE Bug 1201309", url: "https://bugzilla.suse.com/1201309", }, { category: "self", summary: "SUSE Bug 1201310", url: "https://bugzilla.suse.com/1201310", }, { category: "self", summary: "SUSE Bug 1201420", url: "https://bugzilla.suse.com/1201420", }, { category: "self", summary: "SUSE Bug 1201489", url: "https://bugzilla.suse.com/1201489", }, { category: "self", summary: "SUSE Bug 1201610", url: "https://bugzilla.suse.com/1201610", }, { category: "self", summary: "SUSE Bug 1201705", url: "https://bugzilla.suse.com/1201705", }, { category: "self", summary: "SUSE Bug 1201726", url: "https://bugzilla.suse.com/1201726", }, { category: "self", summary: "SUSE Bug 1201865", url: "https://bugzilla.suse.com/1201865", }, { category: "self", summary: "SUSE Bug 1201948", url: "https://bugzilla.suse.com/1201948", }, { category: "self", summary: "SUSE Bug 1201990", url: "https://bugzilla.suse.com/1201990", }, { category: "self", summary: "SUSE Bug 1202095", url: "https://bugzilla.suse.com/1202095", }, { category: "self", summary: "SUSE Bug 1202096", url: "https://bugzilla.suse.com/1202096", }, { category: "self", summary: "SUSE Bug 1202097", url: "https://bugzilla.suse.com/1202097", }, { category: "self", summary: "SUSE Bug 1202341", url: "https://bugzilla.suse.com/1202341", }, { category: "self", summary: "SUSE Bug 1202346", url: "https://bugzilla.suse.com/1202346", }, { category: "self", summary: "SUSE Bug 1202347", url: "https://bugzilla.suse.com/1202347", }, { category: "self", summary: "SUSE Bug 1202385", url: "https://bugzilla.suse.com/1202385", }, { category: "self", summary: "SUSE Bug 1202393", url: "https://bugzilla.suse.com/1202393", }, { category: "self", summary: "SUSE Bug 1202396", url: "https://bugzilla.suse.com/1202396", }, { category: "self", summary: "SUSE Bug 1202447", url: "https://bugzilla.suse.com/1202447", }, { category: "self", summary: "SUSE Bug 1202577", url: "https://bugzilla.suse.com/1202577", }, { category: "self", summary: "SUSE Bug 1202636", url: "https://bugzilla.suse.com/1202636", }, { category: "self", summary: "SUSE Bug 1202638", url: "https://bugzilla.suse.com/1202638", }, { category: "self", summary: "SUSE Bug 1202672", url: "https://bugzilla.suse.com/1202672", }, { category: "self", summary: "SUSE Bug 1202677", url: "https://bugzilla.suse.com/1202677", }, { category: "self", summary: "SUSE Bug 1202701", url: "https://bugzilla.suse.com/1202701", }, { category: "self", summary: "SUSE Bug 1202708", url: "https://bugzilla.suse.com/1202708", }, { category: "self", summary: "SUSE Bug 1202709", url: "https://bugzilla.suse.com/1202709", }, { category: "self", summary: "SUSE Bug 1202710", url: "https://bugzilla.suse.com/1202710", }, { category: "self", summary: "SUSE Bug 1202711", url: "https://bugzilla.suse.com/1202711", }, { category: "self", summary: "SUSE Bug 1202712", url: "https://bugzilla.suse.com/1202712", }, { category: "self", summary: "SUSE Bug 1202713", url: "https://bugzilla.suse.com/1202713", }, { category: "self", summary: "SUSE Bug 1202714", url: "https://bugzilla.suse.com/1202714", }, { category: "self", summary: "SUSE Bug 1202715", url: "https://bugzilla.suse.com/1202715", }, { category: "self", summary: "SUSE Bug 1202716", url: "https://bugzilla.suse.com/1202716", }, { category: "self", summary: "SUSE Bug 1202717", url: "https://bugzilla.suse.com/1202717", }, { category: "self", summary: "SUSE Bug 1202718", url: "https://bugzilla.suse.com/1202718", }, { category: "self", summary: "SUSE Bug 1202720", url: "https://bugzilla.suse.com/1202720", }, { category: "self", summary: "SUSE Bug 1202722", url: "https://bugzilla.suse.com/1202722", }, { category: "self", summary: "SUSE Bug 1202745", url: "https://bugzilla.suse.com/1202745", }, { category: "self", summary: "SUSE Bug 1202756", url: "https://bugzilla.suse.com/1202756", }, { category: "self", summary: "SUSE Bug 1202810", url: "https://bugzilla.suse.com/1202810", }, { category: "self", summary: "SUSE Bug 1202811", url: "https://bugzilla.suse.com/1202811", }, { category: "self", summary: "SUSE Bug 1202860", url: "https://bugzilla.suse.com/1202860", }, { category: "self", summary: "SUSE Bug 1202895", url: "https://bugzilla.suse.com/1202895", }, { category: "self", summary: "SUSE Bug 1202898", url: "https://bugzilla.suse.com/1202898", }, { category: "self", summary: "SUSE Bug 1202960", url: "https://bugzilla.suse.com/1202960", }, { category: "self", summary: "SUSE Bug 1202984", url: "https://bugzilla.suse.com/1202984", }, { category: "self", summary: "SUSE Bug 1203063", url: "https://bugzilla.suse.com/1203063", }, { category: "self", summary: "SUSE Bug 1203098", url: "https://bugzilla.suse.com/1203098", }, { category: "self", summary: "SUSE Bug 1203107", url: "https://bugzilla.suse.com/1203107", }, { category: "self", summary: "SUSE Bug 1203117", url: "https://bugzilla.suse.com/1203117", }, { category: "self", summary: "SUSE Bug 1203135", url: "https://bugzilla.suse.com/1203135", }, { category: "self", summary: "SUSE Bug 1203136", url: "https://bugzilla.suse.com/1203136", }, { category: "self", summary: "SUSE Bug 1203137", url: "https://bugzilla.suse.com/1203137", }, { category: "self", summary: "SUSE Bug 1203159", url: "https://bugzilla.suse.com/1203159", }, { category: "self", summary: "SUSE Bug 1203290", url: "https://bugzilla.suse.com/1203290", }, { category: "self", summary: "SUSE Bug 1203389", url: "https://bugzilla.suse.com/1203389", }, { category: "self", summary: "SUSE Bug 1203410", url: "https://bugzilla.suse.com/1203410", }, { category: "self", summary: "SUSE Bug 1203424", url: "https://bugzilla.suse.com/1203424", }, { category: "self", summary: "SUSE Bug 1203514", url: "https://bugzilla.suse.com/1203514", }, { category: "self", summary: "SUSE Bug 1203552", url: "https://bugzilla.suse.com/1203552", }, { category: "self", summary: "SUSE Bug 1203622", url: "https://bugzilla.suse.com/1203622", }, { category: "self", summary: "SUSE Bug 1203737", url: "https://bugzilla.suse.com/1203737", }, { category: "self", summary: "SUSE Bug 1203769", url: "https://bugzilla.suse.com/1203769", }, { category: "self", summary: "SUSE Bug 1203770", url: "https://bugzilla.suse.com/1203770", }, { category: "self", summary: "SUSE Bug 1203802", url: "https://bugzilla.suse.com/1203802", }, { category: "self", summary: "SUSE Bug 1203906", url: "https://bugzilla.suse.com/1203906", }, { category: "self", summary: "SUSE Bug 1203909", url: "https://bugzilla.suse.com/1203909", }, { category: "self", summary: "SUSE Bug 1203935", url: "https://bugzilla.suse.com/1203935", }, { category: "self", summary: "SUSE Bug 1203939", url: "https://bugzilla.suse.com/1203939", }, { category: "self", summary: "SUSE Bug 1203987", url: "https://bugzilla.suse.com/1203987", }, { category: "self", summary: "SUSE Bug 1203992", url: "https://bugzilla.suse.com/1203992", }, { category: "self", summary: "SUSE Bug 1204051", url: "https://bugzilla.suse.com/1204051", }, { category: "self", summary: "SUSE Bug 1204059", url: "https://bugzilla.suse.com/1204059", }, { category: "self", summary: "SUSE Bug 1204060", url: "https://bugzilla.suse.com/1204060", }, { category: "self", summary: "SUSE Bug 1204125", url: "https://bugzilla.suse.com/1204125", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2020-16119 page", url: "https://www.suse.com/security/cve/CVE-2020-16119/", }, { category: "self", summary: "SUSE CVE CVE-2020-27784 page", url: "https://www.suse.com/security/cve/CVE-2020-27784/", }, { category: "self", summary: "SUSE CVE CVE-2021-4155 page", url: "https://www.suse.com/security/cve/CVE-2021-4155/", }, { category: "self", summary: "SUSE CVE CVE-2021-4203 page", url: "https://www.suse.com/security/cve/CVE-2021-4203/", }, { category: "self", summary: "SUSE CVE CVE-2022-20368 page", url: "https://www.suse.com/security/cve/CVE-2022-20368/", }, { category: "self", summary: "SUSE CVE CVE-2022-20369 page", url: "https://www.suse.com/security/cve/CVE-2022-20369/", }, { category: "self", summary: "SUSE CVE CVE-2022-2503 page", url: "https://www.suse.com/security/cve/CVE-2022-2503/", }, { category: "self", summary: "SUSE CVE CVE-2022-2586 page", url: "https://www.suse.com/security/cve/CVE-2022-2586/", }, { category: "self", summary: "SUSE CVE CVE-2022-2588 page", url: "https://www.suse.com/security/cve/CVE-2022-2588/", }, { category: "self", summary: "SUSE CVE CVE-2022-26373 page", url: "https://www.suse.com/security/cve/CVE-2022-26373/", }, { category: "self", summary: "SUSE CVE CVE-2022-2663 page", url: "https://www.suse.com/security/cve/CVE-2022-2663/", }, { category: "self", summary: "SUSE CVE CVE-2022-2905 page", url: "https://www.suse.com/security/cve/CVE-2022-2905/", }, { category: "self", summary: "SUSE CVE CVE-2022-2977 page", url: "https://www.suse.com/security/cve/CVE-2022-2977/", }, { category: "self", summary: "SUSE CVE CVE-2022-3028 page", url: "https://www.suse.com/security/cve/CVE-2022-3028/", }, { category: "self", summary: "SUSE CVE CVE-2022-3169 page", url: "https://www.suse.com/security/cve/CVE-2022-3169/", }, { category: "self", summary: "SUSE CVE CVE-2022-32296 page", url: "https://www.suse.com/security/cve/CVE-2022-32296/", }, { category: "self", summary: "SUSE CVE CVE-2022-3239 page", url: "https://www.suse.com/security/cve/CVE-2022-3239/", }, { category: "self", summary: "SUSE CVE CVE-2022-3303 page", url: "https://www.suse.com/security/cve/CVE-2022-3303/", }, { category: "self", summary: "SUSE CVE CVE-2022-36879 page", url: "https://www.suse.com/security/cve/CVE-2022-36879/", }, { category: "self", summary: "SUSE CVE CVE-2022-39188 page", url: "https://www.suse.com/security/cve/CVE-2022-39188/", }, { category: "self", summary: "SUSE CVE CVE-2022-39190 page", url: "https://www.suse.com/security/cve/CVE-2022-39190/", }, { category: "self", summary: "SUSE CVE CVE-2022-40768 page", url: "https://www.suse.com/security/cve/CVE-2022-40768/", }, { category: "self", summary: "SUSE CVE CVE-2022-41218 page", url: "https://www.suse.com/security/cve/CVE-2022-41218/", }, { category: "self", summary: "SUSE CVE CVE-2022-41222 page", url: "https://www.suse.com/security/cve/CVE-2022-41222/", }, { category: "self", summary: "SUSE CVE CVE-2022-41674 page", url: "https://www.suse.com/security/cve/CVE-2022-41674/", }, { category: "self", summary: "SUSE CVE CVE-2022-41848 page", url: "https://www.suse.com/security/cve/CVE-2022-41848/", }, { category: "self", summary: "SUSE CVE CVE-2022-41849 page", url: "https://www.suse.com/security/cve/CVE-2022-41849/", }, { category: "self", summary: "SUSE CVE CVE-2022-42719 page", url: "https://www.suse.com/security/cve/CVE-2022-42719/", }, { category: "self", summary: "SUSE CVE CVE-2022-42720 page", url: "https://www.suse.com/security/cve/CVE-2022-42720/", }, { category: "self", summary: "SUSE CVE CVE-2022-42721 page", url: "https://www.suse.com/security/cve/CVE-2022-42721/", }, { category: "self", summary: "SUSE CVE CVE-2022-42722 page", url: "https://www.suse.com/security/cve/CVE-2022-42722/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-10-31T08:28:31Z", generator: { date: "2022-10-31T08:28:31Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:3809-1", initial_release_date: "2022-10-31T08:28:31Z", revision_history: [ { date: "2022-10-31T08:28:31Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.3.18-150300.106.1.noarch", product: { name: "kernel-devel-rt-5.3.18-150300.106.1.noarch", product_id: "kernel-devel-rt-5.3.18-150300.106.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.3.18-150300.106.1.noarch", product: { name: "kernel-source-rt-5.3.18-150300.106.1.noarch", product_id: "kernel-source-rt-5.3.18-150300.106.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", product: { name: "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", product_id: "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product_id: "cluster-md-kmp-rt_debug-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.3.18-150300.106.1.x86_64", product: { name: "dlm-kmp-rt-5.3.18-150300.106.1.x86_64", product_id: "dlm-kmp-rt-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product: { name: "dlm-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product_id: "dlm-kmp-rt_debug-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", product: { name: "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", product_id: "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product: { name: "gfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product_id: "gfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt-devel-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt-devel-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt-extra-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt-extra-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt-optional-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt-optional-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt_debug-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt_debug-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt_debug-extra-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt_debug-extra-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-optional-5.3.18-150300.106.1.x86_64", product: { name: "kernel-rt_debug-optional-5.3.18-150300.106.1.x86_64", product_id: "kernel-rt_debug-optional-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.3.18-150300.106.1.x86_64", product: { name: "kernel-syms-rt-5.3.18-150300.106.1.x86_64", product_id: "kernel-syms-rt-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.3.18-150300.106.1.x86_64", product: { name: "kselftests-kmp-rt-5.3.18-150300.106.1.x86_64", product_id: "kselftests-kmp-rt-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product: { name: "kselftests-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product_id: "kselftests-kmp-rt_debug-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", product: { name: "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", product_id: "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product_id: "ocfs2-kmp-rt_debug-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.3.18-150300.106.1.x86_64", product: { name: "reiserfs-kmp-rt-5.3.18-150300.106.1.x86_64", product_id: "reiserfs-kmp-rt-5.3.18-150300.106.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-5.3.18-150300.106.1.x86_64", product_id: "reiserfs-kmp-rt_debug-5.3.18-150300.106.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Real Time Module 15 SP3", product: { name: "SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.2", product: { name: "openSUSE Leap Micro 5.2", product_id: "openSUSE Leap Micro 5.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", }, product_reference: "dlm-kmp-rt-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.3.18-150300.106.1.noarch as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", }, product_reference: "kernel-devel-rt-5.3.18-150300.106.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", }, product_reference: "kernel-rt-devel-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.3.18-150300.106.1.noarch as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", }, product_reference: "kernel-source-rt-5.3.18-150300.106.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", }, product_reference: "kernel-syms-rt-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Real Time Module 15 SP3", product_id: "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.106.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.106.1.x86_64 as component of openSUSE Leap Micro 5.2", product_id: "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.106.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.2", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2020-16119", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16119", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16119", url: "https://www.suse.com/security/cve/CVE-2020-16119", }, { category: "external", summary: "SUSE Bug 1177471 for CVE-2020-16119", url: "https://bugzilla.suse.com/1177471", }, { category: "external", summary: "SUSE Bug 1177742 for CVE-2020-16119", url: "https://bugzilla.suse.com/1177742", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "important", }, ], title: "CVE-2020-16119", }, { cve: "CVE-2020-27784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27784", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27784", url: "https://www.suse.com/security/cve/CVE-2020-27784", }, { category: "external", summary: "SUSE Bug 1202895 for CVE-2020-27784", url: "https://bugzilla.suse.com/1202895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "low", }, ], title: "CVE-2020-27784", }, { cve: "CVE-2021-4155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4155", }, ], notes: [ { category: "general", text: "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4155", url: "https://www.suse.com/security/cve/CVE-2021-4155", }, { category: "external", summary: "SUSE Bug 1194272 for CVE-2021-4155", url: "https://bugzilla.suse.com/1194272", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-4155", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-4155", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2021-4155", }, { cve: "CVE-2021-4203", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4203", }, ], notes: [ { category: "general", text: "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4203", url: "https://www.suse.com/security/cve/CVE-2021-4203", }, { category: "external", summary: "SUSE Bug 1194535 for CVE-2021-4203", url: "https://bugzilla.suse.com/1194535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2021-4203", }, { cve: "CVE-2022-20368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20368", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20368", url: "https://www.suse.com/security/cve/CVE-2022-20368", }, { category: "external", summary: "SUSE Bug 1202346 for CVE-2022-20368", url: "https://bugzilla.suse.com/1202346", }, { category: "external", summary: "SUSE Bug 1212311 for CVE-2022-20368", url: "https://bugzilla.suse.com/1212311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20369", }, ], notes: [ { category: "general", text: "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20369", url: "https://www.suse.com/security/cve/CVE-2022-20369", }, { category: "external", summary: "SUSE Bug 1202347 for CVE-2022-20369", url: "https://bugzilla.suse.com/1202347", }, { category: "external", summary: "SUSE Bug 1212321 for CVE-2022-20369", url: "https://bugzilla.suse.com/1212321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-20369", }, { cve: "CVE-2022-2503", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2503", }, ], notes: [ { category: "general", text: "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2503", url: "https://www.suse.com/security/cve/CVE-2022-2503", }, { category: "external", summary: "SUSE Bug 1202677 for CVE-2022-2503", url: "https://bugzilla.suse.com/1202677", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-2503", }, { cve: "CVE-2022-2586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2586", }, ], notes: [ { category: "general", text: "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2586", url: "https://www.suse.com/security/cve/CVE-2022-2586", }, { category: "external", summary: "SUSE Bug 1202095 for CVE-2022-2586", url: "https://bugzilla.suse.com/1202095", }, { category: "external", summary: "SUSE Bug 1209719 for CVE-2022-2586", url: "https://bugzilla.suse.com/1209719", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-2586", }, { cve: "CVE-2022-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2588", }, ], notes: [ { category: "general", text: "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2588", url: "https://www.suse.com/security/cve/CVE-2022-2588", }, { category: "external", summary: "SUSE Bug 1202096 for CVE-2022-2588", url: "https://bugzilla.suse.com/1202096", }, { category: "external", summary: "SUSE Bug 1203613 for CVE-2022-2588", url: "https://bugzilla.suse.com/1203613", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2022-2588", url: "https://bugzilla.suse.com/1204183", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-2588", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "important", }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-26373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26373", }, ], notes: [ { category: "general", text: "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26373", url: "https://www.suse.com/security/cve/CVE-2022-26373", }, { category: "external", summary: "SUSE Bug 1201726 for CVE-2022-26373", url: "https://bugzilla.suse.com/1201726", }, { category: "external", summary: "SUSE Bug 1209619 for CVE-2022-26373", url: "https://bugzilla.suse.com/1209619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-26373", }, { cve: "CVE-2022-2663", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2663", }, ], notes: [ { category: "general", text: "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2663", url: "https://www.suse.com/security/cve/CVE-2022-2663", }, { category: "external", summary: "SUSE Bug 1202097 for CVE-2022-2663", url: "https://bugzilla.suse.com/1202097", }, { category: "external", summary: "SUSE Bug 1212299 for CVE-2022-2663", url: "https://bugzilla.suse.com/1212299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-2663", }, { cve: "CVE-2022-2905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2905", }, ], notes: [ { category: "general", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2905", url: "https://www.suse.com/security/cve/CVE-2022-2905", }, { category: "external", summary: "SUSE Bug 1202860 for CVE-2022-2905", url: "https://bugzilla.suse.com/1202860", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-2977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2977", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2977", url: "https://www.suse.com/security/cve/CVE-2022-2977", }, { category: "external", summary: "SUSE Bug 1202672 for CVE-2022-2977", url: "https://bugzilla.suse.com/1202672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-2977", }, { cve: "CVE-2022-3028", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3028", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3028", url: "https://www.suse.com/security/cve/CVE-2022-3028", }, { category: "external", summary: "SUSE Bug 1202898 for CVE-2022-3028", url: "https://bugzilla.suse.com/1202898", }, { category: "external", summary: "SUSE Bug 1212296 for CVE-2022-3028", url: "https://bugzilla.suse.com/1212296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-3169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3169", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3169", url: "https://www.suse.com/security/cve/CVE-2022-3169", }, { category: "external", summary: "SUSE Bug 1203290 for CVE-2022-3169", url: "https://bugzilla.suse.com/1203290", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-3169", }, { cve: "CVE-2022-32296", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32296", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-32296", url: "https://www.suse.com/security/cve/CVE-2022-32296", }, { category: "external", summary: "SUSE Bug 1200288 for CVE-2022-32296", url: "https://bugzilla.suse.com/1200288", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-32296", }, { cve: "CVE-2022-3239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3239", }, ], notes: [ { category: "general", text: "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3239", url: "https://www.suse.com/security/cve/CVE-2022-3239", }, { category: "external", summary: "SUSE Bug 1203552 for CVE-2022-3239", url: "https://bugzilla.suse.com/1203552", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-3239", }, { cve: "CVE-2022-3303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3303", }, ], notes: [ { category: "general", text: "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3303", url: "https://www.suse.com/security/cve/CVE-2022-3303", }, { category: "external", summary: "SUSE Bug 1203769 for CVE-2022-3303", url: "https://bugzilla.suse.com/1203769", }, { category: "external", summary: "SUSE Bug 1212304 for CVE-2022-3303", url: "https://bugzilla.suse.com/1212304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-3303", }, { cve: "CVE-2022-36879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36879", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36879", url: "https://www.suse.com/security/cve/CVE-2022-36879", }, { category: "external", summary: "SUSE Bug 1201948 for CVE-2022-36879", url: "https://bugzilla.suse.com/1201948", }, { category: "external", summary: "SUSE Bug 1212327 for CVE-2022-36879", url: "https://bugzilla.suse.com/1212327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-36879", }, { cve: "CVE-2022-39188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39188", }, ], notes: [ { category: "general", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39188", url: "https://www.suse.com/security/cve/CVE-2022-39188", }, { category: "external", summary: "SUSE Bug 1203107 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203107", }, { category: "external", summary: "SUSE Bug 1203116 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203116", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-39188", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-39188", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1212326 for CVE-2022-39188", url: "https://bugzilla.suse.com/1212326", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39190", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39190", }, ], notes: [ { category: "general", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39190", url: "https://www.suse.com/security/cve/CVE-2022-39190", }, { category: "external", summary: "SUSE Bug 1203117 for CVE-2022-39190", url: "https://bugzilla.suse.com/1203117", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-39190", }, { cve: "CVE-2022-40768", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40768", }, ], notes: [ { category: "general", text: "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40768", url: "https://www.suse.com/security/cve/CVE-2022-40768", }, { category: "external", summary: "SUSE Bug 1203514 for CVE-2022-40768", url: "https://bugzilla.suse.com/1203514", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-40768", }, { cve: "CVE-2022-41218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41218", }, ], notes: [ { category: "general", text: "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41218", url: "https://www.suse.com/security/cve/CVE-2022-41218", }, { category: "external", summary: "SUSE Bug 1202960 for CVE-2022-41218", url: "https://bugzilla.suse.com/1202960", }, { category: "external", summary: "SUSE Bug 1203606 for CVE-2022-41218", url: "https://bugzilla.suse.com/1203606", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-41218", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41218", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "important", }, ], title: "CVE-2022-41218", }, { cve: "CVE-2022-41222", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41222", }, ], notes: [ { category: "general", text: "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41222", url: "https://www.suse.com/security/cve/CVE-2022-41222", }, { category: "external", summary: "SUSE Bug 1203622 for CVE-2022-41222", url: "https://bugzilla.suse.com/1203622", }, { category: "external", summary: "SUSE Bug 1203624 for CVE-2022-41222", url: "https://bugzilla.suse.com/1203624", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41222", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1209476 for CVE-2022-41222", url: "https://bugzilla.suse.com/1209476", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-41222", }, { cve: "CVE-2022-41674", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41674", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41674", url: "https://www.suse.com/security/cve/CVE-2022-41674", }, { category: "external", summary: "SUSE Bug 1203770 for CVE-2022-41674", url: "https://bugzilla.suse.com/1203770", }, { category: "external", summary: "SUSE Bug 1203994 for CVE-2022-41674", url: "https://bugzilla.suse.com/1203994", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41674", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "important", }, ], title: "CVE-2022-41674", }, { cve: "CVE-2022-41848", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41848", }, ], notes: [ { category: "general", text: "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41848", url: "https://www.suse.com/security/cve/CVE-2022-41848", }, { category: "external", summary: "SUSE Bug 1203987 for CVE-2022-41848", url: "https://bugzilla.suse.com/1203987", }, { category: "external", summary: "SUSE Bug 1211484 for CVE-2022-41848", url: "https://bugzilla.suse.com/1211484", }, { category: "external", summary: "SUSE Bug 1212317 for CVE-2022-41848", url: "https://bugzilla.suse.com/1212317", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-41848", }, { cve: "CVE-2022-41849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41849", }, ], notes: [ { category: "general", text: "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41849", url: "https://www.suse.com/security/cve/CVE-2022-41849", }, { category: "external", summary: "SUSE Bug 1203992 for CVE-2022-41849", url: "https://bugzilla.suse.com/1203992", }, { category: "external", summary: "SUSE Bug 1217458 for CVE-2022-41849", url: "https://bugzilla.suse.com/1217458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "moderate", }, ], title: "CVE-2022-41849", }, { cve: "CVE-2022-42719", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42719", }, ], notes: [ { category: "general", text: "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42719", url: "https://www.suse.com/security/cve/CVE-2022-42719", }, { category: "external", summary: "SUSE Bug 1204051 for CVE-2022-42719", url: "https://bugzilla.suse.com/1204051", }, { category: "external", summary: "SUSE Bug 1204292 for CVE-2022-42719", url: "https://bugzilla.suse.com/1204292", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42719", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "important", }, ], title: "CVE-2022-42719", }, { cve: "CVE-2022-42720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42720", }, ], notes: [ { category: "general", text: "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42720", url: "https://www.suse.com/security/cve/CVE-2022-42720", }, { category: "external", summary: "SUSE Bug 1204059 for CVE-2022-42720", url: "https://bugzilla.suse.com/1204059", }, { category: "external", summary: "SUSE Bug 1204291 for CVE-2022-42720", url: "https://bugzilla.suse.com/1204291", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42720", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "important", }, ], title: "CVE-2022-42720", }, { cve: "CVE-2022-42721", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42721", }, ], notes: [ { category: "general", text: "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42721", url: "https://www.suse.com/security/cve/CVE-2022-42721", }, { category: "external", summary: "SUSE Bug 1204060 for CVE-2022-42721", url: "https://bugzilla.suse.com/1204060", }, { category: "external", summary: "SUSE Bug 1204290 for CVE-2022-42721", url: "https://bugzilla.suse.com/1204290", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42721", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "important", }, ], title: "CVE-2022-42721", }, { cve: "CVE-2022-42722", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42722", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42722", url: "https://www.suse.com/security/cve/CVE-2022-42722", }, { category: "external", summary: "SUSE Bug 1204125 for CVE-2022-42722", url: "https://bugzilla.suse.com/1204125", }, { category: "external", summary: "SUSE Bug 1204289 for CVE-2022-42722", url: "https://bugzilla.suse.com/1204289", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42722", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.106.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.106.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.106.1.x86_64", "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.106.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-31T08:28:31Z", details: "important", }, ], title: "CVE-2022-42722", }, ], }
suse-su-2022:3264-1
Vulnerability from csaf_suse
Published
2022-09-14 04:23
Modified
2022-09-14 04:23
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).
- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
The following non-security bugs were fixed:
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).
- ALSA: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo L140PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).
- ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).
- ALSA: hda/realtek: Fix deadlock by COEF mutex (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ARM: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).
- ARM: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).
- ARM: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).
- ARM: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- KABI: cgroup: Restore KABI of css_set (bsc#1201610).
- KVM: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: x86: accept userspace interrupt only if no event is injected (git-fixes).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- NFSv4: Fix second deadlock in nfs4_evict_inode() (git-fixes).
- NFSv4: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- PCI: qcom: Fix pipe clock imbalance (git-fixes).
- SUNRPC reverting d03727b248d0 ('NFSv4 fix CLOSE not waiting for direct IO compeletion') (git-fixes).
- SUNRPC: Clean up scheduling of autoclose (git-fixes).
- SUNRPC: Do not dereference xprt->snd_task if it's a cookie (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- VMCI: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).
- VMCI: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).
- VMCI: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).
- VMCI: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).
- VMCI: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).
- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).
- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).
- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).
- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).
- blktrace: fix blk_rq_merge documentation (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: m_can: process interrupt only when not runtime suspended (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).
- ceph: do not truncate file in atomic_open (bsc#1202811).
- cgroup: Trace event cgroup id fields should be u64 (git-fixes).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).
- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- ehea: fix error return code in ehea_restart_qps() (git-fixes).
- enetc: Fix endianness issues for enetc_qos (git-fixes).
- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- fuse: Remove the control interface for virtio-fs (bsc#1203137).
- fuse: ioctl: translate ENOSYS (bsc#1203136).
- fuse: limit nsec (bsc#1203135).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
- ipmi: ssif: initialize ssif_info->client early (git-fixes).
- ixgbevf: add correct exception tracing for XDP (git-fixes).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- kabi/severities: add stmmac driver local sumbols
- kbuild: do not create built-in objects for external module builds (jsc#SLE-24559 bsc#1202756).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (bsc#1181862 git-fixes).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kernel-obs-build: include qemu_fw_cfg (boo#1201705)
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kfifo: fix ternary sign extension bugs (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).
- net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' (git-fixes).
- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).
- net: cpsw: Properly initialise struct page_pool_params (git-fixes).
- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).
- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).
- net: dsa: b53: fix an off by one in checking 'vlan->vid' (git-fixes).
- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).
- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).
- net: enetc: Use pci_release_region() to release some resources (git-fixes).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).
- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).
- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).
- net: ethernet: ezchip: fix error handling (git-fixes).
- net: ethernet: ezchip: remove redundant check (git-fixes).
- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).
- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).
- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).
- net: fec_ptp: add clock rate zero check (git-fixes).
- net: ftgmac100: Fix crash when removing driver (git-fixes).
- net: hdlc_x25: Return meaningful error code in x25_open (git-fixes).
- net: hns: Fix kernel-doc (git-fixes).
- net: lantiq: fix memory corruption in RX ring (git-fixes).
- net: lapbether: Prevent racing when checking whether the netif is running (git-fixes).
- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mvpp2: fix interrupt mask/unmask skip condition (git-fixes).
- net: netcp: Fix an error message (git-fixes).
- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmicro: handle clk_prepare() failure during init (git-fixes).
- net: stmmac: Modify configuration method of EEE timers (git-fixes).
- net: stmmac: Use resolved link config in mac_link_up() (git-fixes).
- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).
- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- ocfs2: drop acl cache for directories too (bsc#1191667).
- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).
- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).
- octeontx2-af: fix infinite loop in unmapping NPC counter (git-fixes).
- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).
- pinctrl/rockchip: fix gpio device creation (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: define get_cycles macro for arch-override (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- profiling: fix shift too large makes kernel panic (git-fixes).
- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: fix 2KB pgtable release race (git-fixes).
- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).
- silence nfscache allocation warnings with kvzalloc (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- tee: optee: Fix incorrect page free bug (git-fixes).
- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).
- usb: dwc3: ep0: Fix delay status handling (git-fixes).
- usb: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).
- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).
- usb: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).
- usb: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).
- usb: dwc3: gadget: Remove unnecessary checks (git-fixes).
- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).
- usb: dwc3: gadget: Store resource index of start cmd (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings.
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: u_audio: fix race condition on endpoint stop (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).
- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).
Patchnames
SUSE-2022-3264,SUSE-SLE-Module-Basesystem-15-SP3-2022-3264,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3264,SUSE-SLE-Module-Legacy-15-SP3-2022-3264,SUSE-SLE-Module-Live-Patching-15-SP3-2022-3264,SUSE-SLE-Product-HA-15-SP3-2022-3264,SUSE-SLE-Product-WE-15-SP3-2022-3264,SUSE-SUSE-MicroOS-5.1-2022-3264,SUSE-SUSE-MicroOS-5.2-2022-3264,openSUSE-Leap-Micro-5.2-2022-3264,openSUSE-SLE-15.3-2022-3264,openSUSE-SLE-15.4-2022-3264
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n\nThe following non-security bugs were fixed:\n\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- ALSA: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo L140PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).\n- ALSA: hda/realtek: Fix deadlock by COEF mutex (git-fixes).\n- ALSA: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ARM: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).\n- ARM: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).\n- ARM: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).\n- ARM: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- KABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- KVM: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: x86: accept userspace interrupt only if no event is injected (git-fixes).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- NFSv4: Fix second deadlock in nfs4_evict_inode() (git-fixes).\n- NFSv4: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: qcom: Fix pipe clock imbalance (git-fixes).\n- SUNRPC reverting d03727b248d0 ('NFSv4 fix CLOSE not waiting for direct IO compeletion') (git-fixes).\n- SUNRPC: Clean up scheduling of autoclose (git-fixes).\n- SUNRPC: Do not dereference xprt->snd_task if it's a cookie (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- VMCI: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).\n- VMCI: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).\n- VMCI: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).\n- VMCI: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).\n- VMCI: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).\n- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).\n- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).\n- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).\n- blktrace: fix blk_rq_merge documentation (git-fixes).\n- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).\n- can: m_can: process interrupt only when not runtime suspended (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).\n- ceph: do not truncate file in atomic_open (bsc#1202811).\n- cgroup: Trace event cgroup id fields should be u64 (git-fixes).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).\n- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- ehea: fix error return code in ehea_restart_qps() (git-fixes).\n- enetc: Fix endianness issues for enetc_qos (git-fixes).\n- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).\n- fuse: Remove the control interface for virtio-fs (bsc#1203137).\n- fuse: ioctl: translate ENOSYS (bsc#1203136).\n- fuse: limit nsec (bsc#1203135).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: ssif: initialize ssif_info->client early (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (git-fixes).\n- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- kabi/severities: add stmmac driver local sumbols\n- kbuild: do not create built-in objects for external module builds (jsc#SLE-24559 bsc#1202756).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (bsc#1181862 git-fixes).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kernel-obs-build: include qemu_fw_cfg (boo#1201705)\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).\n- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).\n- net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' (git-fixes).\n- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).\n- net: cpsw: Properly initialise struct page_pool_params (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: dsa: b53: fix an off by one in checking 'vlan->vid' (git-fixes).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).\n- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).\n- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).\n- net: ethernet: ezchip: fix error handling (git-fixes).\n- net: ethernet: ezchip: remove redundant check (git-fixes).\n- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).\n- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).\n- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).\n- net: fec_ptp: add clock rate zero check (git-fixes).\n- net: ftgmac100: Fix crash when removing driver (git-fixes).\n- net: hdlc_x25: Return meaningful error code in x25_open (git-fixes).\n- net: hns: Fix kernel-doc (git-fixes).\n- net: lantiq: fix memory corruption in RX ring (git-fixes).\n- net: lapbether: Prevent racing when checking whether the netif is running (git-fixes).\n- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mvpp2: fix interrupt mask/unmask skip condition (git-fixes).\n- net: netcp: Fix an error message (git-fixes).\n- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net: stmmac: Modify configuration method of EEE timers (git-fixes).\n- net: stmmac: Use resolved link config in mac_link_up() (git-fixes).\n- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).\n- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- ocfs2: drop acl cache for directories too (bsc#1191667).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).\n- octeontx2-af: fix infinite loop in unmapping NPC counter (git-fixes).\n- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).\n- pinctrl/rockchip: fix gpio device creation (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: define get_cycles macro for arch-override (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: fix 2KB pgtable release race (git-fixes).\n- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).\n- silence nfscache allocation warnings with kvzalloc (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- tee: optee: Fix incorrect page free bug (git-fixes).\n- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).\n- usb: dwc3: ep0: Fix delay status handling (git-fixes).\n- usb: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).\n- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- usb: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).\n- usb: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).\n- usb: dwc3: gadget: Remove unnecessary checks (git-fixes).\n- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- usb: dwc3: gadget: Store resource index of start cmd (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings.\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: u_audio: fix race condition on endpoint stop (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).\n- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-3264,SUSE-SLE-Module-Basesystem-15-SP3-2022-3264,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3264,SUSE-SLE-Module-Legacy-15-SP3-2022-3264,SUSE-SLE-Module-Live-Patching-15-SP3-2022-3264,SUSE-SLE-Product-HA-15-SP3-2022-3264,SUSE-SLE-Product-WE-15-SP3-2022-3264,SUSE-SUSE-MicroOS-5.1-2022-3264,SUSE-SUSE-MicroOS-5.2-2022-3264,openSUSE-Leap-Micro-5.2-2022-3264,openSUSE-SLE-15.3-2022-3264,openSUSE-SLE-15.4-2022-3264", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3264-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:3264-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20223264-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:3264-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html", }, { category: "self", summary: "SUSE Bug 1023051", url: "https://bugzilla.suse.com/1023051", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1179722", url: "https://bugzilla.suse.com/1179722", }, { category: "self", summary: "SUSE Bug 1179723", url: "https://bugzilla.suse.com/1179723", }, { category: "self", summary: "SUSE Bug 1181862", url: "https://bugzilla.suse.com/1181862", }, { category: "self", summary: "SUSE Bug 1191662", url: "https://bugzilla.suse.com/1191662", }, { category: "self", summary: "SUSE Bug 1191667", url: "https://bugzilla.suse.com/1191667", }, { category: "self", summary: "SUSE Bug 1191881", url: "https://bugzilla.suse.com/1191881", }, { category: "self", summary: "SUSE Bug 1192594", url: "https://bugzilla.suse.com/1192594", }, { category: "self", summary: "SUSE Bug 1192968", url: "https://bugzilla.suse.com/1192968", }, { category: "self", summary: "SUSE Bug 1194272", url: "https://bugzilla.suse.com/1194272", }, { category: "self", summary: "SUSE Bug 1194535", url: "https://bugzilla.suse.com/1194535", }, { category: "self", summary: "SUSE Bug 1197158", url: "https://bugzilla.suse.com/1197158", }, { category: "self", summary: "SUSE Bug 1197755", url: "https://bugzilla.suse.com/1197755", }, { category: "self", summary: "SUSE Bug 1197756", url: "https://bugzilla.suse.com/1197756", }, { category: "self", summary: "SUSE Bug 1197757", url: "https://bugzilla.suse.com/1197757", }, { category: "self", summary: "SUSE Bug 1197760", url: "https://bugzilla.suse.com/1197760", }, { category: "self", summary: "SUSE Bug 1197763", url: "https://bugzilla.suse.com/1197763", }, { category: "self", summary: "SUSE Bug 1197920", url: "https://bugzilla.suse.com/1197920", }, { category: "self", summary: "SUSE Bug 1198971", url: "https://bugzilla.suse.com/1198971", }, { category: "self", summary: "SUSE Bug 1199291", url: "https://bugzilla.suse.com/1199291", }, { category: "self", summary: "SUSE Bug 1200431", url: "https://bugzilla.suse.com/1200431", }, { category: "self", summary: "SUSE Bug 1200845", url: "https://bugzilla.suse.com/1200845", }, { category: "self", summary: "SUSE Bug 1200868", url: "https://bugzilla.suse.com/1200868", }, { category: "self", summary: "SUSE Bug 1200869", url: "https://bugzilla.suse.com/1200869", }, { category: "self", summary: "SUSE Bug 1200870", url: "https://bugzilla.suse.com/1200870", }, { category: "self", summary: "SUSE Bug 1200871", url: "https://bugzilla.suse.com/1200871", }, { category: "self", summary: "SUSE Bug 1200872", url: "https://bugzilla.suse.com/1200872", }, { category: "self", summary: "SUSE Bug 1200873", url: "https://bugzilla.suse.com/1200873", }, { category: "self", summary: "SUSE Bug 1201019", url: "https://bugzilla.suse.com/1201019", }, { category: "self", summary: "SUSE Bug 1201420", url: "https://bugzilla.suse.com/1201420", }, { category: "self", summary: "SUSE Bug 1201610", url: "https://bugzilla.suse.com/1201610", }, { category: "self", summary: "SUSE Bug 1201705", url: "https://bugzilla.suse.com/1201705", }, { category: "self", summary: "SUSE Bug 1201726", url: "https://bugzilla.suse.com/1201726", }, { category: "self", summary: "SUSE Bug 1201948", url: "https://bugzilla.suse.com/1201948", }, { category: "self", summary: "SUSE Bug 1202096", url: "https://bugzilla.suse.com/1202096", }, { category: "self", summary: "SUSE Bug 1202097", url: "https://bugzilla.suse.com/1202097", }, { category: "self", summary: "SUSE Bug 1202346", url: "https://bugzilla.suse.com/1202346", }, { category: "self", summary: "SUSE Bug 1202347", url: "https://bugzilla.suse.com/1202347", }, { category: "self", summary: "SUSE Bug 1202393", url: "https://bugzilla.suse.com/1202393", }, { category: "self", summary: "SUSE Bug 1202396", url: "https://bugzilla.suse.com/1202396", }, { category: "self", summary: "SUSE Bug 1202447", url: "https://bugzilla.suse.com/1202447", }, { category: "self", summary: "SUSE Bug 1202564", url: "https://bugzilla.suse.com/1202564", }, { category: "self", summary: "SUSE Bug 1202577", url: "https://bugzilla.suse.com/1202577", }, { category: "self", summary: "SUSE Bug 1202636", url: "https://bugzilla.suse.com/1202636", }, { category: "self", summary: "SUSE Bug 1202672", url: "https://bugzilla.suse.com/1202672", }, { category: "self", summary: "SUSE Bug 1202701", url: "https://bugzilla.suse.com/1202701", }, { category: "self", summary: "SUSE Bug 1202708", url: "https://bugzilla.suse.com/1202708", }, { category: "self", summary: "SUSE Bug 1202709", url: "https://bugzilla.suse.com/1202709", }, { category: "self", summary: "SUSE Bug 1202710", url: "https://bugzilla.suse.com/1202710", }, { category: "self", summary: "SUSE Bug 1202711", url: "https://bugzilla.suse.com/1202711", }, { category: "self", summary: "SUSE Bug 1202712", url: "https://bugzilla.suse.com/1202712", }, { category: "self", summary: "SUSE Bug 1202713", url: "https://bugzilla.suse.com/1202713", }, { category: "self", summary: "SUSE Bug 1202714", url: "https://bugzilla.suse.com/1202714", }, { category: "self", summary: "SUSE Bug 1202715", url: "https://bugzilla.suse.com/1202715", }, { category: "self", summary: "SUSE Bug 1202716", url: "https://bugzilla.suse.com/1202716", }, { category: "self", summary: "SUSE Bug 1202717", url: "https://bugzilla.suse.com/1202717", }, { category: "self", summary: "SUSE Bug 1202718", url: "https://bugzilla.suse.com/1202718", }, { category: "self", summary: "SUSE Bug 1202720", url: "https://bugzilla.suse.com/1202720", }, { category: "self", summary: "SUSE Bug 1202722", url: "https://bugzilla.suse.com/1202722", }, { category: "self", summary: "SUSE Bug 1202745", url: "https://bugzilla.suse.com/1202745", }, { category: "self", summary: "SUSE Bug 1202756", url: "https://bugzilla.suse.com/1202756", }, { category: "self", summary: "SUSE Bug 1202810", url: "https://bugzilla.suse.com/1202810", }, { category: "self", summary: "SUSE Bug 1202811", url: "https://bugzilla.suse.com/1202811", }, { category: "self", summary: "SUSE Bug 1202860", url: "https://bugzilla.suse.com/1202860", }, { category: "self", summary: "SUSE Bug 1202895", url: "https://bugzilla.suse.com/1202895", }, { category: "self", summary: "SUSE Bug 1202898", url: "https://bugzilla.suse.com/1202898", }, { category: "self", summary: "SUSE Bug 1203063", url: "https://bugzilla.suse.com/1203063", }, { category: "self", summary: "SUSE Bug 1203098", url: "https://bugzilla.suse.com/1203098", }, { category: "self", summary: "SUSE Bug 1203107", url: "https://bugzilla.suse.com/1203107", }, { category: "self", summary: "SUSE Bug 1203116", url: "https://bugzilla.suse.com/1203116", }, { category: "self", summary: "SUSE Bug 1203117", url: "https://bugzilla.suse.com/1203117", }, { category: "self", summary: "SUSE Bug 1203135", url: "https://bugzilla.suse.com/1203135", }, { category: "self", summary: "SUSE Bug 1203136", url: "https://bugzilla.suse.com/1203136", }, { category: "self", summary: "SUSE Bug 1203137", url: "https://bugzilla.suse.com/1203137", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2020-27784 page", url: "https://www.suse.com/security/cve/CVE-2020-27784/", }, { category: "self", summary: "SUSE CVE CVE-2021-4155 page", url: "https://www.suse.com/security/cve/CVE-2021-4155/", }, { category: "self", summary: "SUSE CVE CVE-2021-4203 page", url: "https://www.suse.com/security/cve/CVE-2021-4203/", }, { category: "self", summary: "SUSE CVE CVE-2022-20368 page", url: "https://www.suse.com/security/cve/CVE-2022-20368/", }, { category: "self", summary: "SUSE CVE CVE-2022-20369 page", url: "https://www.suse.com/security/cve/CVE-2022-20369/", }, { category: "self", summary: "SUSE CVE CVE-2022-2588 page", url: "https://www.suse.com/security/cve/CVE-2022-2588/", }, { category: "self", summary: "SUSE CVE CVE-2022-26373 page", url: "https://www.suse.com/security/cve/CVE-2022-26373/", }, { category: "self", summary: "SUSE CVE CVE-2022-2663 page", url: "https://www.suse.com/security/cve/CVE-2022-2663/", }, { category: "self", summary: "SUSE CVE CVE-2022-2905 page", url: "https://www.suse.com/security/cve/CVE-2022-2905/", }, { category: "self", summary: "SUSE CVE CVE-2022-2977 page", url: "https://www.suse.com/security/cve/CVE-2022-2977/", }, { category: "self", summary: "SUSE CVE CVE-2022-3028 page", url: "https://www.suse.com/security/cve/CVE-2022-3028/", }, { category: "self", summary: "SUSE CVE CVE-2022-36879 page", url: "https://www.suse.com/security/cve/CVE-2022-36879/", }, { category: "self", summary: "SUSE CVE CVE-2022-39188 page", url: "https://www.suse.com/security/cve/CVE-2022-39188/", }, { category: "self", summary: "SUSE CVE CVE-2022-39190 page", url: "https://www.suse.com/security/cve/CVE-2022-39190/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-09-14T04:23:33Z", generator: { date: "2022-09-14T04:23:33Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:3264-1", initial_release_date: "2022-09-14T04:23:33Z", revision_history: [ { date: "2022-09-14T04:23:33Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product_id: "cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product: { name: "dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product_id: "dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", product_id: "dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-al-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-al-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-al-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-allwinner-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-allwinner-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-altera-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-altera-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-amd-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-amd-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-amlogic-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-amlogic-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-apm-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-apm-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-arm-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-arm-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-broadcom-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-broadcom-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-cavium-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-cavium-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-exynos-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-exynos-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-freescale-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-freescale-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-lg-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-lg-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-marvell-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-marvell-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-mediatek-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-mediatek-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-nvidia-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-nvidia-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-qcom-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-qcom-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-renesas-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-renesas-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-rockchip-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-rockchip-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-socionext-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-socionext-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-sprd-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-sprd-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-xilinx-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-xilinx-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "dtb-zte-5.3.18-150300.59.93.1.aarch64", product: { name: "dtb-zte-5.3.18-150300.59.93.1.aarch64", product_id: "dtb-zte-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product: { name: "gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product_id: "gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-64kb-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-64kb-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-default-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-default-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", product: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", product_id: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-default-devel-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-default-devel-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-default-extra-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-default-extra-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-default-optional-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-default-optional-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-obs-build-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-obs-build-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-preempt-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-preempt-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.93.1.aarch64", product: { name: "kernel-syms-5.3.18-150300.59.93.1.aarch64", product_id: "kernel-syms-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product: { name: "kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product_id: "kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product_id: "ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", product_id: "reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150300.59.93.1.noarch", product: { name: "kernel-devel-5.3.18-150300.59.93.1.noarch", product_id: "kernel-devel-5.3.18-150300.59.93.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150300.59.93.1.noarch", product: { name: "kernel-docs-5.3.18-150300.59.93.1.noarch", product_id: "kernel-docs-5.3.18-150300.59.93.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150300.59.93.1.noarch", product: { name: "kernel-docs-html-5.3.18-150300.59.93.1.noarch", product_id: "kernel-docs-html-5.3.18-150300.59.93.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150300.59.93.1.noarch", product: { name: "kernel-macros-5.3.18-150300.59.93.1.noarch", product_id: "kernel-macros-5.3.18-150300.59.93.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150300.59.93.1.noarch", product: { name: "kernel-source-5.3.18-150300.59.93.1.noarch", product_id: "kernel-source-5.3.18-150300.59.93.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", product_id: "kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-debug-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-debug-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-default-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-default-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", product: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", product_id: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", product_id: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.93.1.ppc64le", product: { name: "kernel-syms-5.3.18-150300.59.93.1.ppc64le", product_id: "kernel-syms-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.93.1.s390x", product: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.s390x", product_id: "dlm-kmp-default-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", product_id: "gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-default-5.3.18-150300.59.93.1.s390x", product_id: "kernel-default-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", product: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", product_id: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-default-devel-5.3.18-150300.59.93.1.s390x", product_id: "kernel-default-devel-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-default-extra-5.3.18-150300.59.93.1.s390x", product_id: "kernel-default-extra-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", product_id: "kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-default-optional-5.3.18-150300.59.93.1.s390x", product_id: "kernel-default-optional-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", product: { name: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", product_id: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-obs-build-5.3.18-150300.59.93.1.s390x", product_id: "kernel-obs-build-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-obs-qa-5.3.18-150300.59.93.1.s390x", product_id: "kernel-obs-qa-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-syms-5.3.18-150300.59.93.1.s390x", product_id: "kernel-syms-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", product_id: "kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", product_id: "kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", product_id: "dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-debug-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-debug-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-default-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-default-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", product: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", product_id: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-default-devel-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-default-devel-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-default-extra-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-default-extra-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-default-optional-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-default-optional-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_93-preempt-1-150300.7.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_93-preempt-1-150300.7.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_93-preempt-1-150300.7.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-obs-build-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-obs-build-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-preempt-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-preempt-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.93.1.x86_64", product: { name: "kernel-syms-5.3.18-150300.59.93.1.x86_64", product_id: "kernel-syms-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP3", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP3", product: { name: "SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.2", product: { name: "openSUSE Leap Micro 5.2", product_id: "openSUSE Leap Micro 5.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.2", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.93.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.93.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.93.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.93.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-syms-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-extra-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.s390x as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap Micro 5.2", product_id: "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap Micro 5.2", product_id: "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64 as component of openSUSE Leap Micro 5.2", product_id: "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64 as component of openSUSE Leap Micro 5.2", product_id: "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, product_reference: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, product_reference: "cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, product_reference: "dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-al-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-al-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-allwinner-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-altera-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-amd-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-amlogic-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-apm-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-arm-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-broadcom-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-cavium-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-exynos-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-freescale-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-lg-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-marvell-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-mediatek-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-nvidia-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-qcom-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-renesas-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-rockchip-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-socionext-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-sprd-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-xilinx-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-zte-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-zte-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, product_reference: "gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, product_reference: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, product_reference: "gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-debug-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-debug-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", }, product_reference: "kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-extra-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-extra-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-extra-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-default-optional-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-default-optional-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-default-optional-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.93.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.93.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.3.18-150300.59.93.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-docs-html-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.93.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.93.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.3.18-150300.59.93.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", }, product_reference: "kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-syms-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", }, product_reference: "kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, product_reference: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, product_reference: "kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, product_reference: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, product_reference: "ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", }, product_reference: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", }, product_reference: "reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dtb-al-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-al-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-zte-5.3.18-150300.59.93.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", }, product_reference: "dtb-zte-5.3.18-150300.59.93.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2020-27784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27784", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27784", url: "https://www.suse.com/security/cve/CVE-2020-27784", }, { category: "external", summary: "SUSE Bug 1202895 for CVE-2020-27784", url: "https://bugzilla.suse.com/1202895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "low", }, ], title: "CVE-2020-27784", }, { cve: "CVE-2021-4155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4155", }, ], notes: [ { category: "general", text: "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4155", url: "https://www.suse.com/security/cve/CVE-2021-4155", }, { category: "external", summary: "SUSE Bug 1194272 for CVE-2021-4155", url: "https://bugzilla.suse.com/1194272", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-4155", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-4155", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2021-4155", }, { cve: "CVE-2021-4203", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4203", }, ], notes: [ { category: "general", text: "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4203", url: "https://www.suse.com/security/cve/CVE-2021-4203", }, { category: "external", summary: "SUSE Bug 1194535 for CVE-2021-4203", url: "https://bugzilla.suse.com/1194535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2021-4203", }, { cve: "CVE-2022-20368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20368", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20368", url: "https://www.suse.com/security/cve/CVE-2022-20368", }, { category: "external", summary: "SUSE Bug 1202346 for CVE-2022-20368", url: "https://bugzilla.suse.com/1202346", }, { category: "external", summary: "SUSE Bug 1212311 for CVE-2022-20368", url: "https://bugzilla.suse.com/1212311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20369", }, ], notes: [ { category: "general", text: "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20369", url: "https://www.suse.com/security/cve/CVE-2022-20369", }, { category: "external", summary: "SUSE Bug 1202347 for CVE-2022-20369", url: "https://bugzilla.suse.com/1202347", }, { category: "external", summary: "SUSE Bug 1212321 for CVE-2022-20369", url: "https://bugzilla.suse.com/1212321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-20369", }, { cve: "CVE-2022-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2588", }, ], notes: [ { category: "general", text: "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2588", url: "https://www.suse.com/security/cve/CVE-2022-2588", }, { category: "external", summary: "SUSE Bug 1202096 for CVE-2022-2588", url: "https://bugzilla.suse.com/1202096", }, { category: "external", summary: "SUSE Bug 1203613 for CVE-2022-2588", url: "https://bugzilla.suse.com/1203613", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2022-2588", url: "https://bugzilla.suse.com/1204183", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-2588", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "important", }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-26373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26373", }, ], notes: [ { category: "general", text: "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26373", url: "https://www.suse.com/security/cve/CVE-2022-26373", }, { category: "external", summary: "SUSE Bug 1201726 for CVE-2022-26373", url: "https://bugzilla.suse.com/1201726", }, { category: "external", summary: "SUSE Bug 1209619 for CVE-2022-26373", url: "https://bugzilla.suse.com/1209619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-26373", }, { cve: "CVE-2022-2663", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2663", }, ], notes: [ { category: "general", text: "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2663", url: "https://www.suse.com/security/cve/CVE-2022-2663", }, { category: "external", summary: "SUSE Bug 1202097 for CVE-2022-2663", url: "https://bugzilla.suse.com/1202097", }, { category: "external", summary: "SUSE Bug 1212299 for CVE-2022-2663", url: "https://bugzilla.suse.com/1212299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-2663", }, { cve: "CVE-2022-2905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2905", }, ], notes: [ { category: "general", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2905", url: "https://www.suse.com/security/cve/CVE-2022-2905", }, { category: "external", summary: "SUSE Bug 1202860 for CVE-2022-2905", url: "https://bugzilla.suse.com/1202860", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-2977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2977", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2977", url: "https://www.suse.com/security/cve/CVE-2022-2977", }, { category: "external", summary: "SUSE Bug 1202672 for CVE-2022-2977", url: "https://bugzilla.suse.com/1202672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-2977", }, { cve: "CVE-2022-3028", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3028", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3028", url: "https://www.suse.com/security/cve/CVE-2022-3028", }, { category: "external", summary: "SUSE Bug 1202898 for CVE-2022-3028", url: "https://bugzilla.suse.com/1202898", }, { category: "external", summary: "SUSE Bug 1212296 for CVE-2022-3028", url: "https://bugzilla.suse.com/1212296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-36879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36879", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36879", url: "https://www.suse.com/security/cve/CVE-2022-36879", }, { category: "external", summary: "SUSE Bug 1201948 for CVE-2022-36879", url: "https://bugzilla.suse.com/1201948", }, { category: "external", summary: "SUSE Bug 1212327 for CVE-2022-36879", url: "https://bugzilla.suse.com/1212327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-36879", }, { cve: "CVE-2022-39188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39188", }, ], notes: [ { category: "general", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39188", url: "https://www.suse.com/security/cve/CVE-2022-39188", }, { category: "external", summary: "SUSE Bug 1203107 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203107", }, { category: "external", summary: "SUSE Bug 1203116 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203116", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-39188", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-39188", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1212326 for CVE-2022-39188", url: "https://bugzilla.suse.com/1212326", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39190", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39190", }, ], notes: [ { category: "general", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39190", url: "https://www.suse.com/security/cve/CVE-2022-39190", }, { category: "external", summary: "SUSE Bug 1203117 for CVE-2022-39190", url: "https://bugzilla.suse.com/1203117", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_93-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.93.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.93.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.93.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.93.1.150300.18.54.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-14T04:23:33Z", details: "moderate", }, ], title: "CVE-2022-39190", }, ], }
suse-su-2022:3288-1
Vulnerability from csaf_suse
Published
2022-09-16 08:38
Modified
2022-09-16 08:38
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-36946: Fixed a denial of service (panic) inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bnc#1203041).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bnc#1202681).
- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bnc#1202623).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bnc#1202558).
- CVE-2022-28693: Fixed x86/speculation behavior by disabling RRSBA (bsc#1201455).
- CVE-2022-28356: Fixed a refcount leak bug that was found in net/llc/af_llc.c (bnc#1197391).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors that may have allowed information disclosure via local access (bnc#1201726).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-2585: Fixed missing cleanup of CPU timers before freeing them during exec (bsc#1202094).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-1184: Fixed an use-after-free flaw in fs/ext4/namei.c:dx_insert_block() in the filesystem sub-component (bnc#1198577).
- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).
- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1199515).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
The following non-security bugs were fixed:
- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: VIOT: Fix ACS setup (git-fixes).
- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: thermal: drop an always true check (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).
- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).
- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Add endianness annotations (git-fixes).
- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).
- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).
- ALSA: usb-audio: Turn off 'manual mode' on Dell dock (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).
- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).
- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).
- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).
- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).
- ARM: dts: ast2500-evb: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb: fix board compatible (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).
- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).
- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).
- ARM: dts: imx6ul: add missing properties for sram (git-fixes).
- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).
- ARM: dts: imx6ul: fix csi node compatible (git-fixes).
- ARM: dts: imx6ul: fix keypad compatible (git-fixes).
- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).
- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).
- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).
- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).
- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).
- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).
- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).
- ARM: findbit: fix overflowing offset (git-fixes).
- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).
- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).
- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).
- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).
- ASoC: imx-audmux: Silence a clang warning (git-fixes).
- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).
- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).
- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).
- ASoC: mt6359: Fix refcount leak bug (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).
- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).
- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).
- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).
- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).
- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).
- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).
- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).
- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).
- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).
- Documentation: PM: Drop pme_interrupt reference (git-fixes).
- Documentation: dm writecache: Render status list as list (git-fixes).
- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).
- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).
- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).
- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).
- HID: add Lenovo Yoga C630 battery quirk (git-fixes).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: amd_sfh: Add NULL check for hid device (git-fixes).
- HID: amd_sfh: Handle condition of 'no sensors' (git-fixes).
- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- HID: hid-input: add Surface Go battery quirk (git-fixes).
- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).
- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).
- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).
- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).
- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - merge quirk tables (git-fies).
- Input: i8042 - move __initconst to fix code styling warning (git-fies).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- KABI: cgroup: Restore KABI of css_set (bsc#1201610).
- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).
- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).
- KVM: MMU: shadow nested paging does not have PKU (git-fixes).
- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).
- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).
- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).
- KVM: SVM: Unwind 'speculative' RIP advancement if INTn injection 'fails' (git-fixes).
- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).
- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).
- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).
- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).
- KVM: X86: Use vcpu->arch.walk_mmu for kvm_mmu_invlpg() (git-fixes).
- KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).
- KVM: nVMX: do not use vcpu->arch.efer when checking host state on nested state load (git-fixes).
- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).
- KVM: x86/mmu: Move 'invalid' check out of kvm_tdp_mmu_get_root() (git-fixes).
- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).
- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).
- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).
- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).
- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).
- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).
- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb() (git-fixes).
- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).
- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).
- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (git-fixes).
- NFSD: Fix ia_size underflow (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI/AER: Iterate over error counters instead of error strings (git-fixes).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).
- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).
- Revert 'clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops' (git-fixes).
- Revert 'drivers/video/backlight/platform_lcd.c: add support for device tree based probe' (git-fixes).
- Revert 'drm/i915: Hold reference to intel_context over life of i915_request' (git-fixes).
- Revert 'drm/udl: Kill pending URBs at suspend and disconnect' (bsc#1195917).
- Revert 'ipv6: Honor all IPv6 PIO Valid Lifetime values' (bsc#1202989).
- Revert 'net: usb: ax88179_178a needs FLAG_SEND_ZLP' (git-fixes).
- Revert 'scripts/mod/modpost.c: permit '.cranges' secton for sh64 architecture.' (git-fixes).
- Revert 'usb: gadget: udc-xilinx: replace memcpy with memcpy_toio' (git-fixes).
- Revert 'x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV' (bsc#1190497).
- SUNRPC: Fix NFSD's request deferral on RDMA transports (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- apparmor: Fix failed mount permission check error message (git-fixes).
- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).
- apparmor: fix aa_label_asxprint return check (git-fixes).
- apparmor: fix absroot causing audited secids to begin with = (git-fixes).
- apparmor: fix overlapping attachment computation (git-fixes).
- apparmor: fix quiet_denied for file rules (git-fixes).
- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).
- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).
- arm64: Do not forget syscall when starting a new thread (git-fixes).
- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).
- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).
- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).
- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).
- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).
- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).
- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).
- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).
- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).
- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).
- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).
- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).
- arm64: fix rodata=full (git-fixes).
- arm64: kasan: Revert 'arm64: mte: reset the page tag in page->flags' (git-fixes).
- arm64: set UXN on swapper page tables (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).
- arm64: tegra: Fixup SYSRAM references (git-fixes).
- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ath11k: Fix incorrect debug_mask mappings (git-fixes).
- ath11k: fix netdev open race (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).
- ax25: Fix ax25 session cleanup problems (git-fixes).
- block: Fix fsync always failed if once failed (bsc#1202779).
- block: Fix wrong offset in bio_truncate() (bsc#1202780).
- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).
- block: only mark bio as tracked if it really is tracked (bsc#1202782).
- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).
- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).
- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: mcp251x: Fix race condition on receive interrupt (git-fixes).
- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).
- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).
- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).
- ceph: do not truncate file in atomic_open (bsc#1202824).
- ceph: use correct index when encoding client supported features (bsc#1202822).
- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: mediatek: reset: Fix written reset bit offset (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver's init level (git-fixes).
- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).
- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).
- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).
- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).
- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).
- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).
- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).
- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).
- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).
- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).
- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).
- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).
- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).
- crypto: hisilicon/sec - fix auth key size error (git-fixes).
- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).
- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).
- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).
- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).
- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).
- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).
- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).
- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).
- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).
- docs: zh_CN: fix a broken reference (git-fixes).
- dpaa2-eth: fix ethtool statistics (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drivers/iio: Remove all strcpy() uses (git-fixes).
- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).
- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).
- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).
- drm/amd/display: Avoid MPC infinite loop (git-fixes).
- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).
- drm/amd/display: Fix pixel clock programming (git-fixes).
- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).
- drm/amd/display: For stereo keep 'FLIP_ANY_FRAME' (git-fixes).
- drm/amd/display: Reset DMCUB before HW init (git-fixes).
- drm/amd/display: Revert 'drm/amd/display: turn DPMS off on connector unplug' (git-fixes).
- drm/amd/display: avoid doing vm_init multiple time (git-fixes).
- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).
- drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).
- drm/amdgpu: Remove one duplicated ef removal (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/bridge: lt9611uxc: Cancel only driver's work (git-fixes).
- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).
- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/i915: fix null pointer dereference (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: Allow commands to be sent during video mode (git-fixes).
- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).
- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).
- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/msm/dpu: Fix for non-visible planes (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/hdmi: drop empty 'none' regulator lists (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).
- drm/msm: Fix dirtyfb refcounting (git-fixes).
- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).
- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).
- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/nouveau: recognise GA103 (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/shmem-helper: Add missing vunmap on error (git-fixes).
- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).
- drm/udl: Add parameter to set number of URBs (bsc#1195917).
- drm/udl: Add reset_resume (bsc#1195917)
- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).
- drm/udl: Drop unneeded alignment (bsc#1195917).
- drm/udl: Enable damage clipping (bsc#1195917).
- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).
- drm/udl: Fix potential URB leaks (bsc#1195917).
- drm/udl: Increase the default URB list size to 20 (bsc#1195917).
- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).
- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).
- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).
- drm/udl: Restore display mode on resume (bsc#1195917)
- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).
- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).
- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).
- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).
- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).
- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).
- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).
- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).
- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).
- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).
- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).
- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).
- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).
- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.
- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).
- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).
- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).
- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769).
- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).
- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).
- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).
- ext4: fix null-ptr-deref in '__ext4_journal_ensure_credits' (bsc#1202764).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix super block checksum incorrect after mount (bsc#1202773).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).
- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).
- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).
- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).
- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).
- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).
- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fix race between exit_itimers() and /proc/pid/timers (git-fixes).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- ftrace/x86: Add back ftrace_expected assignment (git-fixes).
- fuse: ioctl: translate ENOSYS (bsc#1203139).
- fuse: limit nsec (bsc#1203138).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- grub: Fix symbol `grub_disk_get_size' not found (bsc#1201361 bsc#1192968).
- habanalabs/gaudi: fix shift out of bounds (git-fixes).
- habanalabs/gaudi: mask constant value before cast (git-fixes).
- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).
- hwmon: (drivetemp) Add module alias (git-fixes).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).
- i2c: Fix a potential use after free (git-fixes).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- i2c: mxs: Silence a clang warning (git-fixes).
- i2c: npcm: Capitalize the one-line comment (git-fixes).
- i2c: npcm: Correct slave role behavior (git-fixes).
- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).
- ice: fix 'scheduling while atomic' on aux critical err interrupt (git-fixes).
- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).
- ieee80211: change HE nominal packet padding value defines (bsc#1202131).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).
- iio: accel: bma400: Reordering of header files (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).
- iio: ad7292: Prevent regulator double disable (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: common: ssp: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).
- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- interconnect: imx: fix max_node_id (git-fixes).
- io_uring: add a schedule point in io_add_buffers() (git-fixes).
- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).
- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).
- iommu/amd: Enable swiotlb in all cases (git-fixes).
- iommu/amd: Fix I/O page table memory leak (git-fixes).
- iommu/amd: Recover from event log overflow (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).
- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/dart: Add missing module owner to ops structure (git-fixes).
- iommu/dart: check return value after calling platform_get_resource() (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).
- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).
- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).
- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).
- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Drop stop marker messages (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).
- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).
- iommu/vt-d: Remove global g_iommus array (bsc#1200301).
- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).
- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).
- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- iommu: Fix potential use-after-free during probe (git-fixes).
- ipmi: fix initialization when workqueue allocation fails (git-fixes).
- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).
- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).
- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).
- iwlwifi: Add support for more BZ HWs (bsc#1202131).
- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).
- iwlwifi: BZ Family SW reset support (bsc#1202131).
- iwlwifi: Configure FW debug preset via module param (bsc#1202131).
- iwlwifi: Fix FW name for gl (bsc#1202131).
- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).
- iwlwifi: Fix syntax errors in comments (bsc#1202131).
- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).
- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).
- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).
- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).
- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).
- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).
- iwlwifi: add new Qu-Hr device (bsc#1202131).
- iwlwifi: add new ax1650 killer device (bsc#1202131).
- iwlwifi: add new device id 7F70 (bsc#1202131).
- iwlwifi: add new pci SoF with JF (bsc#1202131).
- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).
- iwlwifi: add support for BNJ HW (bsc#1202131).
- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).
- iwlwifi: add support for Bz-Z HW (bsc#1202131).
- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).
- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).
- iwlwifi: allow rate-limited error messages (bsc#1202131).
- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).
- iwlwifi: api: remove ttl field from TX command (bsc#1202131).
- iwlwifi: api: remove unused RX status bits (bsc#1202131).
- iwlwifi: avoid variable shadowing (bsc#1202131).
- iwlwifi: avoid void pointer arithmetic (bsc#1202131).
- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).
- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).
- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).
- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).
- iwlwifi: dbg: check trigger data before access (bsc#1202131).
- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).
- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).
- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).
- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).
- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).
- iwlwifi: de-const properly where needed (bsc#1202131).
- iwlwifi: debugfs: remove useless double condition (bsc#1202131).
- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).
- iwlwifi: do not use __unused as variable name (bsc#1202131).
- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).
- iwlwifi: dump CSR scratch from outer function (bsc#1202131).
- iwlwifi: dump RCM error tables (bsc#1202131).
- iwlwifi: dump both TCM error tables if present (bsc#1202131).
- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).
- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: eeprom: clean up macros (bsc#1202131).
- iwlwifi: fix LED dependencies (bsc#1202131).
- iwlwifi: fix debug TLV parsing (bsc#1202131).
- iwlwifi: fix fw/img.c license statement (bsc#1202131).
- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).
- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).
- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).
- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).
- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).
- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).
- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).
- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).
- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).
- iwlwifi: fw: make dump_start callback void (bsc#1202131).
- iwlwifi: fw: remove dead error log code (bsc#1202131).
- iwlwifi: implement reset flow for Bz devices (bsc#1202131).
- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).
- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).
- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).
- iwlwifi: make some functions friendly to sparse (bsc#1202131).
- iwlwifi: move symbols into a separate namespace (bsc#1202131).
- iwlwifi: mvm/api: define system control command (bsc#1202131).
- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).
- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).
- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).
- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).
- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).
- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).
- iwlwifi: mvm: Do not fail if PPAG isn't supported (bsc#1202131).
- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).
- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).
- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).
- iwlwifi: mvm: Remove antenna c references (bsc#1202131).
- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).
- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).
- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).
- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).
- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).
- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).
- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).
- iwlwifi: mvm: add US/CA to TAS block list if OEM isn't allowed (bsc#1202131).
- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).
- iwlwifi: mvm: add definitions for new rate & flags (bsc#1202131).
- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).
- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).
- iwlwifi: mvm: add some missing command strings (bsc#1202131).
- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).
- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).
- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).
- iwlwifi: mvm: add support for OCE scan (bsc#1202131).
- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).
- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).
- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).
- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).
- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).
- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).
- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).
- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).
- iwlwifi: mvm: convert old rate & flags to the new format (bsc#1202131).
- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).
- iwlwifi: mvm: correctly set channel flags (bsc#1202131).
- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).
- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).
- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).
- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).
- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).
- iwlwifi: mvm: do not get address of mvm->fwrt just to dereference as a pointer (bsc#1202131).
- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).
- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).
- iwlwifi: mvm: drop too short packets silently (bsc#1202131).
- iwlwifi: mvm: extend session protection on association (bsc#1202131).
- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).
- iwlwifi: mvm: fix a stray tab (bsc#1202131).
- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).
- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).
- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).
- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).
- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).
- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).
- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).
- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).
- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).
- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).
- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).
- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).
- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).
- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).
- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).
- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).
- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).
- iwlwifi: mvm: remove card state notification code (bsc#1202131).
- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).
- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).
- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).
- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).
- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).
- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).
- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).
- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).
- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).
- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).
- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).
- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).
- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).
- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).
- iwlwifi: mvm: support RLC configuration command (bsc#1202131).
- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).
- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).
- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).
- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).
- iwlwifi: mvm: update RFI TLV (bsc#1202131).
- iwlwifi: mvm: update definitions due to new rate & flags (bsc#1202131).
- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).
- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).
- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).
- iwlwifi: nvm: Correct HE capability (bsc#1202131).
- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).
- iwlwifi: parse error tables from debug TLVs (bsc#1202131).
- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).
- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).
- iwlwifi: pcie: add support for MS devices (bsc#1202131).
- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).
- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).
- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).
- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).
- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).
- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).
- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).
- iwlwifi: pcie: remove duplicate entry (bsc#1202131).
- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).
- iwlwifi: pcie: retake ownership after reset (bsc#1202131).
- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).
- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).
- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).
- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).
- iwlwifi: pnvm: print out the version properly (bsc#1202131).
- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).
- iwlwifi: propagate (const) type qualifier (bsc#1202131).
- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).
- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).
- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).
- iwlwifi: remove contact information (bsc#1202131).
- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).
- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).
- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).
- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).
- iwlwifi: remove unused macros (bsc#1202131).
- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).
- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).
- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).
- iwlwifi: scan: Modify return value of a function (bsc#1202131).
- iwlwifi: support 4-bits in MAC step value (bsc#1202131).
- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).
- iwlwifi: support new queue allocation command (bsc#1202131).
- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).
- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).
- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).
- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).
- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).
- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).
- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).
- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).
- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).
- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).
- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).
- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).
- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).
- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).
- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).
- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).
- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).
- kabi/severities: add Qlogic qed symbols
- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471
- kabi/severities: add hisilicon hns3 symbols
- kabi/severities: add microchip dsa drivers
- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.
- kabi/severities: octeontx2 driver (jsc#SLE-24682)
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kbuild: fix the modules order between drivers and libs (git-fixes).
- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).
- kcm: fix strp_init() order and cleanup (git-fies).
- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages
- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.
- kfifo: fix kfifo_to_user() return type (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib/raid6/test: fix multiple definition linking error (git-fixes).
- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).
- lkdtm: Disable return thunks in rodata.c (bsc#1190497).
- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).
- loop: Check for overflow while configuring loop (git-fies).
- mac80211: fix a memory leak where sta_info is not freed (git-fixes).
- mac80211: introduce channel switch disconnect function (bsc#1202131).
- marvell: octeontx2: build error: unknown type name 'u64' (jsc#SLE-24682).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).
- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).
- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).
- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).
- media: cedrus: h265: Fix flag name (git-fixes).
- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).
- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).
- media: hantro: postproc: Fix motion vector space size (git-fixes).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: hevc: Embedded indexes in RPS (git-fixes).
- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).
- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).
- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).
- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).
- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after 'mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse' (git-fixes).
- mm/rmap: Fix anon_vma-degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mmc: block: Add single read for 4k sector cards (git-fixes).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).
- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).
- mmc: mxcmmc: Silence a clang warning (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- mmc: tmio: avoid glitches when resetting (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).
- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).
- mtd: dataflash: Add SPI ID table (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).
- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).
- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).
- n_gsm: remove unused parameters from gsm_error() (git-fixes).
- net: asix: fix 'can't send until first packet is send' issue (git-fixes).
- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).
- net: dsa: b53: Add SPI ID table (git-fixes).
- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).
- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).
- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).
- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).
- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).
- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).
- net: dsa: microchip: implement multi-bridge support (git-fixes).
- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).
- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).
- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).
- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).
- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).
- net: dsa: mv88e6xxx: Unforce speed & duplex in mac_link_down() (git-fixes).
- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).
- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).
- net: dsa: mv88e6xxx: fix 'do not use PHY_DETECT on internal PHY's' (git-fixes).
- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).
- net: dsa: qca8k: fix MTU calculation (git-fixes).
- net: dsa: seville: register the mdiobus under devres (git-fixes).
- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: hns3: clean residual vf config after disable sriov (git-fixes).
- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).
- net: marvell: prestera: fix incorrect structure access (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).
- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).
- net: mscc: ocelot: set up traps for PTP packets (git-fixes).
- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).
- net: openvswitch: fix leak of nested actions (git-fixes).
- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).
- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).
- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).
- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).
- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).
- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmmac: clean up impossible condition (git-fixes).
- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).
- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).
- net: stmmac: fix off-by-one error in sanity check (git-fixes).
- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).
- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).
- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nmi: Extend NMI watchdog's timer during LPM (bsc#1202872 ltc#197920).
- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).
- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).
- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).
- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvmet: Expose max queues to configfs (bsc#1201865).
- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).
- ocfs2: fix a deadlock when commit trans (bsc#1202776).
- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).
- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).
- octeontx2-af: Add SDP interface support (jsc#SLE-24682).
- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).
- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).
- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).
- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).
- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).
- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).
- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).
- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).
- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).
- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).
- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).
- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).
- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).
- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).
- octeontx2-af: Fix spelling mistake 'Makesure' -> 'Make sure' (jsc#SLE-24682).
- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).
- octeontx2-af: Flow control resource management (jsc#SLE-24682).
- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).
- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).
- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).
- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).
- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).
- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).
- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).
- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).
- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).
- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).
- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).
- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).
- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).
- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).
- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).
- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).
- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).
- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).
- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).
- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).
- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).
- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).
- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).
- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).
- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).
- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).
- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).
- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).
- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).
- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).
- octeontx2-af: fix array bound error (jsc#SLE-24682).
- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).
- octeontx2-af: initialize action variable (jsc#SLE-24682).
- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).
- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).
- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).
- octeontx2-af: verify CQ context updates (jsc#SLE-24682).
- octeontx2-nic: fix mixed module build (jsc#SLE-24682).
- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).
- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).
- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).
- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).
- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).
- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).
- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).
- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).
- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).
- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).
- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).
- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).
- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).
- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).
- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).
- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).
- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).
- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).
- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).
- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).
- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).
- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).
- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).
- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).
- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).
- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).
- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).
- pci: Add support for ACPI RST reset method (jsc#SLE-19359 jsc#SLE-24572).
- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).
- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).
- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).
- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).
- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- platform/chrome: cros_ec: Always expose last resume result (git-fixes).
- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- proc: fix a dentry lock race between release_task and lookup (git-fixes).
- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).
- profiling: fix shift too large makes kernel panic (git-fixes).
- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).
- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).
- pwm: lpc18xx: Fix period handling (git-fixes).
- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).
- r8152: fix the RX FIFO settings when suspending (git-fixes).
- r8152: fix the units of some registers for RTL8156A (git-fixes).
- random: remove useless header comment (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).
- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).
- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).
- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).
- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).
- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).
- rose: check NULL rose_loopback_neigh->loopback (git-fixes).
- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.
- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.
- rpm/kernel-source.spec.in: simplify finding of broken symlinks 'find -xtype l' will report them, so use that to make the search a bit faster (without using shell).
- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).
- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).
- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).
- s390/cpumf: Handle events cycles and instructions identical (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).
- s390/hypfs: avoid error message under KVM (bsc#1032323).
- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).
- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).
- s390/stp: clock_delta should be signed (git-fixes).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).
- sched/core: Do not requeue task on CPU excluded from cpus_mask (bnc#1199356).
- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).
- sched/fair: Remove redundant word ' *' (bnc#1189999 (Scheduler functional and performance backports)).
- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)
- sched/uclamp: Fix rq->uclamp_max not set on first enqueue (git-fixes)
- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh
- sched: Remove unused function group_first_cpu() (bnc#1189999).
- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).
- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).
- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).
- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).
- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).
- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).
- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).
- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).
- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: ufs: core: Fix another task management completion race (git-fixes).
- scsi: ufs: core: Fix task management completion timeout race (git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).
- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).
- selftests: kvm: set rax before vmcall (git-fixes).
- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).
- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).
- selinux: Add boundary check in put_entry() (git-fixes).
- selinux: access superblock_security_struct in LSM blob way (git-fixes).
- selinux: check return value of sel_make_avc_files (git-fixes).
- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).
- selinux: fix double free of cond_list on error paths (git-fixes).
- selinux: fix memleak in security_read_state_kernel() (git-fixes).
- selinux: fix misuse of mutex_is_locked() (git-fixes).
- selinux: use correct type for context length (git-fixes).
- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).
- serial: 8250: Export ICR access helpers for internal use (git-fixes).
- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).
- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).
- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).
- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).
- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).
- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).
- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).
- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).
- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- soundwire: qcom: Check device status before reading devid (git-fixes).
- soundwire: qcom: fix device status array range (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: Fix simplification of devm_spi_register_controller (git-fixes).
- spi: dt-bindings: cadence: add missing 'required' (git-fixes).
- spi: dt-bindings: zynqmp-qspi: add missing 'required' (git-fixes).
- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).
- spi: spi-altera-dfl: Fix an error handling path (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and changed all octeontx2 modules as supported (jsc#SLE-24682)
- supported.conf: mark lib/objagg supported as dependency of mlxsw
- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)
- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).
- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).
- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).
- tracing: Have filter accept 'common_cpu' to be consistent (git-fixes).
- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).
- tty: 8250: Add support for Brainboxes PX cards (git-fixes).
- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).
- tty: n_gsm: Modify cr bit value when config requester (git-fixes).
- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).
- tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() (git-fixes).
- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).
- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).
- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).
- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).
- tty: n_gsm: fix DM command (git-fixes).
- tty: n_gsm: fix broken virtual tty handling (git-fixes).
- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).
- tty: n_gsm: fix flow control handling in tx path (git-fixes).
- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).
- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).
- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).
- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).
- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).
- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).
- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).
- tty: n_gsm: fix tty registration before control channel open (git-fixes).
- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).
- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).
- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).
- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).
- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- udf: Fix crash after seekdir (bsc#1194592).
- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).
- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).
- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).
- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).
- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).
- usb: cdns3: fix random warning message when driver load (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).
- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).
- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).
- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).
- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).
- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).
- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).
- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).
- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).
- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).
- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- usb: xhci: tegra: Fix error check (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).
- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).
- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- vfio: Clear the caps->buf to NULL after free (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).
- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).
- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- wireless: Remove redundant 'flush_workqueue()' calls (bsc#1202131).
- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).
- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).
- x86/sev: Save the negotiated GHCB version (bsc#1190497).
- xen/gntdev: fix unmap notification order (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xen: detect uninitialized xenbus in xenbus_init (git-fixes).
- xen: do not continue xenstore initialization in case of errors (git-fixes).
- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).
- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).
- xfs: fix use-after-free in xattr node block inactivation (git-fixes).
- xfs: fold perag loop iteration logic into helper function (git-fixes).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: only bother with sync_filesystem during readonly remount (git-fixes).
- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).
- xfs: rename the next_agno perag iteration variable (git-fixes).
- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).
- xfs: revert 'xfs: actually bump warning counts when we send warnings' (git-fixes).
- xfs: terminate perag iteration reliably on agcount (git-fixes).
- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xfs: use setattr_copy to set vfs inode attributes (git-fixes).
Patchnames
SUSE-2022-3288,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3288,openSUSE-SLE-15.4-2022-3288
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-36946: Fixed a denial of service (panic) inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bnc#1203041).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bnc#1202681).\n- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bnc#1202623).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bnc#1202558).\n- CVE-2022-28693: Fixed x86/speculation behavior by disabling RRSBA (bsc#1201455).\n- CVE-2022-28356: Fixed a refcount leak bug that was found in net/llc/af_llc.c (bnc#1197391).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors that may have allowed information disclosure via local access (bnc#1201726).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-2585: Fixed missing cleanup of CPU timers before freeing them during exec (bsc#1202094).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-1184: Fixed an use-after-free flaw in fs/ext4/namei.c:dx_insert_block() in the filesystem sub-component (bnc#1198577).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).\n- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1199515).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: VIOT: Fix ACS setup (git-fixes).\n- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: thermal: drop an always true check (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).\n- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).\n- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Add endianness annotations (git-fixes).\n- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).\n- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).\n- ALSA: usb-audio: Turn off 'manual mode' on Dell dock (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).\n- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).\n- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).\n- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).\n- ARM: dts: ast2500-evb: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb: fix board compatible (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).\n- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).\n- ARM: dts: imx6ul: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).\n- ARM: dts: imx6ul: fix csi node compatible (git-fixes).\n- ARM: dts: imx6ul: fix keypad compatible (git-fixes).\n- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).\n- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).\n- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).\n- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).\n- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).\n- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).\n- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).\n- ARM: findbit: fix overflowing offset (git-fixes).\n- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).\n- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).\n- ASoC: imx-audmux: Silence a clang warning (git-fixes).\n- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).\n- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).\n- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).\n- ASoC: mt6359: Fix refcount leak bug (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).\n- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).\n- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).\n- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).\n- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).\n- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).\n- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).\n- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).\n- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).\n- Documentation: PM: Drop pme_interrupt reference (git-fixes).\n- Documentation: dm writecache: Render status list as list (git-fixes).\n- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).\n- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).\n- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).\n- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).\n- HID: add Lenovo Yoga C630 battery quirk (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: amd_sfh: Add NULL check for hid device (git-fixes).\n- HID: amd_sfh: Handle condition of 'no sensors' (git-fixes).\n- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: hid-input: add Surface Go battery quirk (git-fixes).\n- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).\n- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).\n- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).\n- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).\n- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - merge quirk tables (git-fies).\n- Input: i8042 - move __initconst to fix code styling warning (git-fies).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- KABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).\n- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).\n- KVM: MMU: shadow nested paging does not have PKU (git-fixes).\n- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).\n- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).\n- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).\n- KVM: SVM: Unwind 'speculative' RIP advancement if INTn injection 'fails' (git-fixes).\n- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).\n- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).\n- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).\n- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).\n- KVM: X86: Use vcpu->arch.walk_mmu for kvm_mmu_invlpg() (git-fixes).\n- KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).\n- KVM: nVMX: do not use vcpu->arch.efer when checking host state on nested state load (git-fixes).\n- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).\n- KVM: x86/mmu: Move 'invalid' check out of kvm_tdp_mmu_get_root() (git-fixes).\n- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).\n- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).\n- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).\n- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).\n- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).\n- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).\n- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb() (git-fixes).\n- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).\n- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).\n- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (git-fixes).\n- NFSD: Fix ia_size underflow (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/AER: Iterate over error counters instead of error strings (git-fixes).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).\n- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).\n- Revert 'clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops' (git-fixes).\n- Revert 'drivers/video/backlight/platform_lcd.c: add support for device tree based probe' (git-fixes).\n- Revert 'drm/i915: Hold reference to intel_context over life of i915_request' (git-fixes).\n- Revert 'drm/udl: Kill pending URBs at suspend and disconnect' (bsc#1195917).\n- Revert 'ipv6: Honor all IPv6 PIO Valid Lifetime values' (bsc#1202989).\n- Revert 'net: usb: ax88179_178a needs FLAG_SEND_ZLP' (git-fixes).\n- Revert 'scripts/mod/modpost.c: permit '.cranges' secton for sh64 architecture.' (git-fixes).\n- Revert 'usb: gadget: udc-xilinx: replace memcpy with memcpy_toio' (git-fixes).\n- Revert 'x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV' (bsc#1190497).\n- SUNRPC: Fix NFSD's request deferral on RDMA transports (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- apparmor: Fix failed mount permission check error message (git-fixes).\n- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).\n- apparmor: fix aa_label_asxprint return check (git-fixes).\n- apparmor: fix absroot causing audited secids to begin with = (git-fixes).\n- apparmor: fix overlapping attachment computation (git-fixes).\n- apparmor: fix quiet_denied for file rules (git-fixes).\n- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).\n- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).\n- arm64: Do not forget syscall when starting a new thread (git-fixes).\n- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).\n- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).\n- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).\n- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).\n- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).\n- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).\n- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).\n- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).\n- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).\n- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).\n- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).\n- arm64: fix rodata=full (git-fixes).\n- arm64: kasan: Revert 'arm64: mte: reset the page tag in page->flags' (git-fixes).\n- arm64: set UXN on swapper page tables (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).\n- arm64: tegra: Fixup SYSRAM references (git-fixes).\n- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath11k: Fix incorrect debug_mask mappings (git-fixes).\n- ath11k: fix netdev open race (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).\n- ax25: Fix ax25 session cleanup problems (git-fixes).\n- block: Fix fsync always failed if once failed (bsc#1202779).\n- block: Fix wrong offset in bio_truncate() (bsc#1202780).\n- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).\n- block: only mark bio as tracked if it really is tracked (bsc#1202782).\n- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).\n- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).\n- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: mcp251x: Fix race condition on receive interrupt (git-fixes).\n- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).\n- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).\n- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).\n- ceph: do not truncate file in atomic_open (bsc#1202824).\n- ceph: use correct index when encoding client supported features (bsc#1202822).\n- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: mediatek: reset: Fix written reset bit offset (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver's init level (git-fixes).\n- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).\n- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).\n- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).\n- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).\n- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).\n- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).\n- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).\n- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).\n- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).\n- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/sec - fix auth key size error (git-fixes).\n- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).\n- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).\n- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).\n- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).\n- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).\n- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).\n- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).\n- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).\n- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).\n- docs: zh_CN: fix a broken reference (git-fixes).\n- dpaa2-eth: fix ethtool statistics (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drivers/iio: Remove all strcpy() uses (git-fixes).\n- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).\n- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).\n- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).\n- drm/amd/display: Avoid MPC infinite loop (git-fixes).\n- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).\n- drm/amd/display: Fix pixel clock programming (git-fixes).\n- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).\n- drm/amd/display: For stereo keep 'FLIP_ANY_FRAME' (git-fixes).\n- drm/amd/display: Reset DMCUB before HW init (git-fixes).\n- drm/amd/display: Revert 'drm/amd/display: turn DPMS off on connector unplug' (git-fixes).\n- drm/amd/display: avoid doing vm_init multiple time (git-fixes).\n- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).\n- drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid (git-fixes).\n- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).\n- drm/amdgpu: Remove one duplicated ef removal (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/bridge: lt9611uxc: Cancel only driver's work (git-fixes).\n- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).\n- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).\n- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).\n- drm/i915: fix null pointer dereference (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: Allow commands to be sent during video mode (git-fixes).\n- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).\n- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).\n- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/msm/dpu: Fix for non-visible planes (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: drop empty 'none' regulator lists (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).\n- drm/msm: Fix dirtyfb refcounting (git-fixes).\n- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).\n- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).\n- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/nouveau: recognise GA103 (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/shmem-helper: Add missing vunmap on error (git-fixes).\n- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).\n- drm/udl: Add parameter to set number of URBs (bsc#1195917).\n- drm/udl: Add reset_resume (bsc#1195917)\n- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).\n- drm/udl: Drop unneeded alignment (bsc#1195917).\n- drm/udl: Enable damage clipping (bsc#1195917).\n- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).\n- drm/udl: Fix potential URB leaks (bsc#1195917).\n- drm/udl: Increase the default URB list size to 20 (bsc#1195917).\n- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).\n- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).\n- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).\n- drm/udl: Restore display mode on resume (bsc#1195917)\n- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).\n- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).\n- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).\n- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).\n- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).\n- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).\n- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).\n- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).\n- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).\n- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).\n- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).\n- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).\n- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).\n- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769).\n- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).\n- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).\n- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).\n- ext4: fix null-ptr-deref in '__ext4_journal_ensure_credits' (bsc#1202764).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix super block checksum incorrect after mount (bsc#1202773).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).\n- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).\n- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).\n- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).\n- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).\n- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).\n- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fix race between exit_itimers() and /proc/pid/timers (git-fixes).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).\n- ftrace/x86: Add back ftrace_expected assignment (git-fixes).\n- fuse: ioctl: translate ENOSYS (bsc#1203139).\n- fuse: limit nsec (bsc#1203138).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- grub: Fix symbol `grub_disk_get_size' not found (bsc#1201361 bsc#1192968).\n- habanalabs/gaudi: fix shift out of bounds (git-fixes).\n- habanalabs/gaudi: mask constant value before cast (git-fixes).\n- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).\n- hwmon: (drivetemp) Add module alias (git-fixes).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- i2c: mxs: Silence a clang warning (git-fixes).\n- i2c: npcm: Capitalize the one-line comment (git-fixes).\n- i2c: npcm: Correct slave role behavior (git-fixes).\n- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).\n- ice: fix 'scheduling while atomic' on aux critical err interrupt (git-fixes).\n- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).\n- ieee80211: change HE nominal packet padding value defines (bsc#1202131).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).\n- iio: accel: bma400: Reordering of header files (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).\n- iio: ad7292: Prevent regulator double disable (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: common: ssp: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).\n- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- interconnect: imx: fix max_node_id (git-fixes).\n- io_uring: add a schedule point in io_add_buffers() (git-fixes).\n- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).\n- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).\n- iommu/amd: Enable swiotlb in all cases (git-fixes).\n- iommu/amd: Fix I/O page table memory leak (git-fixes).\n- iommu/amd: Recover from event log overflow (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).\n- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/dart: Add missing module owner to ops structure (git-fixes).\n- iommu/dart: check return value after calling platform_get_resource() (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).\n- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).\n- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).\n- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).\n- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Drop stop marker messages (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).\n- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).\n- iommu/vt-d: Remove global g_iommus array (bsc#1200301).\n- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).\n- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).\n- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu: Fix potential use-after-free during probe (git-fixes).\n- ipmi: fix initialization when workqueue allocation fails (git-fixes).\n- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).\n- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).\n- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).\n- iwlwifi: Add support for more BZ HWs (bsc#1202131).\n- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).\n- iwlwifi: BZ Family SW reset support (bsc#1202131).\n- iwlwifi: Configure FW debug preset via module param (bsc#1202131).\n- iwlwifi: Fix FW name for gl (bsc#1202131).\n- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).\n- iwlwifi: Fix syntax errors in comments (bsc#1202131).\n- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).\n- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).\n- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).\n- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).\n- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).\n- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).\n- iwlwifi: add new Qu-Hr device (bsc#1202131).\n- iwlwifi: add new ax1650 killer device (bsc#1202131).\n- iwlwifi: add new device id 7F70 (bsc#1202131).\n- iwlwifi: add new pci SoF with JF (bsc#1202131).\n- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).\n- iwlwifi: add support for BNJ HW (bsc#1202131).\n- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).\n- iwlwifi: add support for Bz-Z HW (bsc#1202131).\n- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).\n- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).\n- iwlwifi: allow rate-limited error messages (bsc#1202131).\n- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).\n- iwlwifi: api: remove ttl field from TX command (bsc#1202131).\n- iwlwifi: api: remove unused RX status bits (bsc#1202131).\n- iwlwifi: avoid variable shadowing (bsc#1202131).\n- iwlwifi: avoid void pointer arithmetic (bsc#1202131).\n- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).\n- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).\n- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).\n- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).\n- iwlwifi: dbg: check trigger data before access (bsc#1202131).\n- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).\n- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).\n- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).\n- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).\n- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).\n- iwlwifi: de-const properly where needed (bsc#1202131).\n- iwlwifi: debugfs: remove useless double condition (bsc#1202131).\n- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).\n- iwlwifi: do not use __unused as variable name (bsc#1202131).\n- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).\n- iwlwifi: dump CSR scratch from outer function (bsc#1202131).\n- iwlwifi: dump RCM error tables (bsc#1202131).\n- iwlwifi: dump both TCM error tables if present (bsc#1202131).\n- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).\n- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: eeprom: clean up macros (bsc#1202131).\n- iwlwifi: fix LED dependencies (bsc#1202131).\n- iwlwifi: fix debug TLV parsing (bsc#1202131).\n- iwlwifi: fix fw/img.c license statement (bsc#1202131).\n- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).\n- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).\n- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).\n- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).\n- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).\n- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).\n- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).\n- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).\n- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).\n- iwlwifi: fw: make dump_start callback void (bsc#1202131).\n- iwlwifi: fw: remove dead error log code (bsc#1202131).\n- iwlwifi: implement reset flow for Bz devices (bsc#1202131).\n- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).\n- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).\n- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).\n- iwlwifi: make some functions friendly to sparse (bsc#1202131).\n- iwlwifi: move symbols into a separate namespace (bsc#1202131).\n- iwlwifi: mvm/api: define system control command (bsc#1202131).\n- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).\n- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).\n- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).\n- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).\n- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).\n- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).\n- iwlwifi: mvm: Do not fail if PPAG isn't supported (bsc#1202131).\n- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).\n- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).\n- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).\n- iwlwifi: mvm: Remove antenna c references (bsc#1202131).\n- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).\n- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).\n- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).\n- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).\n- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).\n- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).\n- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).\n- iwlwifi: mvm: add US/CA to TAS block list if OEM isn't allowed (bsc#1202131).\n- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).\n- iwlwifi: mvm: add definitions for new rate & flags (bsc#1202131).\n- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).\n- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).\n- iwlwifi: mvm: add some missing command strings (bsc#1202131).\n- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).\n- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).\n- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).\n- iwlwifi: mvm: add support for OCE scan (bsc#1202131).\n- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).\n- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).\n- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).\n- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).\n- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).\n- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).\n- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).\n- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).\n- iwlwifi: mvm: convert old rate & flags to the new format (bsc#1202131).\n- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).\n- iwlwifi: mvm: correctly set channel flags (bsc#1202131).\n- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).\n- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).\n- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).\n- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).\n- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).\n- iwlwifi: mvm: do not get address of mvm->fwrt just to dereference as a pointer (bsc#1202131).\n- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).\n- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).\n- iwlwifi: mvm: drop too short packets silently (bsc#1202131).\n- iwlwifi: mvm: extend session protection on association (bsc#1202131).\n- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).\n- iwlwifi: mvm: fix a stray tab (bsc#1202131).\n- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).\n- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).\n- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).\n- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).\n- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).\n- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).\n- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).\n- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).\n- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).\n- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).\n- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).\n- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).\n- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).\n- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).\n- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).\n- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).\n- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).\n- iwlwifi: mvm: remove card state notification code (bsc#1202131).\n- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).\n- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).\n- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).\n- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).\n- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).\n- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).\n- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).\n- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).\n- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).\n- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).\n- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).\n- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).\n- iwlwifi: mvm: support RLC configuration command (bsc#1202131).\n- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).\n- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).\n- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).\n- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).\n- iwlwifi: mvm: update RFI TLV (bsc#1202131).\n- iwlwifi: mvm: update definitions due to new rate & flags (bsc#1202131).\n- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).\n- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).\n- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).\n- iwlwifi: nvm: Correct HE capability (bsc#1202131).\n- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).\n- iwlwifi: parse error tables from debug TLVs (bsc#1202131).\n- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).\n- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).\n- iwlwifi: pcie: add support for MS devices (bsc#1202131).\n- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).\n- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).\n- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).\n- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).\n- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).\n- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).\n- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).\n- iwlwifi: pcie: remove duplicate entry (bsc#1202131).\n- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).\n- iwlwifi: pcie: retake ownership after reset (bsc#1202131).\n- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).\n- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).\n- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).\n- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).\n- iwlwifi: pnvm: print out the version properly (bsc#1202131).\n- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).\n- iwlwifi: propagate (const) type qualifier (bsc#1202131).\n- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).\n- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).\n- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).\n- iwlwifi: remove contact information (bsc#1202131).\n- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).\n- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).\n- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).\n- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).\n- iwlwifi: remove unused macros (bsc#1202131).\n- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).\n- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).\n- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).\n- iwlwifi: scan: Modify return value of a function (bsc#1202131).\n- iwlwifi: support 4-bits in MAC step value (bsc#1202131).\n- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).\n- iwlwifi: support new queue allocation command (bsc#1202131).\n- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).\n- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).\n- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).\n- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).\n- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).\n- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).\n- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).\n- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).\n- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).\n- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).\n- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).\n- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).\n- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).\n- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).\n- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).\n- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).\n- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).\n- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).\n- kabi/severities: add Qlogic qed symbols\n- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471\n- kabi/severities: add hisilicon hns3 symbols\n- kabi/severities: add microchip dsa drivers\n- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.\n- kabi/severities: octeontx2 driver (jsc#SLE-24682)\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kbuild: fix the modules order between drivers and libs (git-fixes).\n- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).\n- kcm: fix strp_init() order and cleanup (git-fies).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib/raid6/test: fix multiple definition linking error (git-fixes).\n- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).\n- lkdtm: Disable return thunks in rodata.c (bsc#1190497).\n- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).\n- loop: Check for overflow while configuring loop (git-fies).\n- mac80211: fix a memory leak where sta_info is not freed (git-fixes).\n- mac80211: introduce channel switch disconnect function (bsc#1202131).\n- marvell: octeontx2: build error: unknown type name 'u64' (jsc#SLE-24682).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).\n- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).\n- media: cedrus: h265: Fix flag name (git-fixes).\n- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).\n- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).\n- media: hantro: postproc: Fix motion vector space size (git-fixes).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: hevc: Embedded indexes in RPS (git-fixes).\n- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).\n- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).\n- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).\n- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).\n- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after 'mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse' (git-fixes).\n- mm/rmap: Fix anon_vma-degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mmc: block: Add single read for 4k sector cards (git-fixes).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).\n- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).\n- mmc: mxcmmc: Silence a clang warning (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- mmc: tmio: avoid glitches when resetting (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).\n- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).\n- mtd: dataflash: Add SPI ID table (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).\n- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).\n- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).\n- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).\n- n_gsm: remove unused parameters from gsm_error() (git-fixes).\n- net: asix: fix 'can't send until first packet is send' issue (git-fixes).\n- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).\n- net: dsa: b53: Add SPI ID table (git-fixes).\n- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).\n- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).\n- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).\n- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).\n- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).\n- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).\n- net: dsa: microchip: implement multi-bridge support (git-fixes).\n- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).\n- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).\n- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).\n- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).\n- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).\n- net: dsa: mv88e6xxx: Unforce speed & duplex in mac_link_down() (git-fixes).\n- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).\n- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).\n- net: dsa: mv88e6xxx: fix 'do not use PHY_DETECT on internal PHY's' (git-fixes).\n- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).\n- net: dsa: qca8k: fix MTU calculation (git-fixes).\n- net: dsa: seville: register the mdiobus under devres (git-fixes).\n- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: hns3: clean residual vf config after disable sriov (git-fixes).\n- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).\n- net: marvell: prestera: fix incorrect structure access (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).\n- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).\n- net: mscc: ocelot: set up traps for PTP packets (git-fixes).\n- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).\n- net: openvswitch: fix leak of nested actions (git-fixes).\n- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).\n- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).\n- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).\n- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).\n- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmmac: clean up impossible condition (git-fixes).\n- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).\n- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).\n- net: stmmac: fix off-by-one error in sanity check (git-fixes).\n- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).\n- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).\n- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nmi: Extend NMI watchdog's timer during LPM (bsc#1202872 ltc#197920).\n- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).\n- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).\n- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).\n- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).\n- ocfs2: fix a deadlock when commit trans (bsc#1202776).\n- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).\n- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).\n- octeontx2-af: Add SDP interface support (jsc#SLE-24682).\n- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).\n- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).\n- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).\n- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).\n- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).\n- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).\n- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).\n- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).\n- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).\n- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).\n- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).\n- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).\n- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).\n- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).\n- octeontx2-af: Fix spelling mistake 'Makesure' -> 'Make sure' (jsc#SLE-24682).\n- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).\n- octeontx2-af: Flow control resource management (jsc#SLE-24682).\n- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).\n- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).\n- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).\n- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).\n- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).\n- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).\n- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).\n- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).\n- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).\n- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).\n- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).\n- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).\n- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).\n- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).\n- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).\n- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).\n- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).\n- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).\n- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).\n- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).\n- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).\n- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).\n- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).\n- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).\n- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).\n- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).\n- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).\n- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).\n- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).\n- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).\n- octeontx2-af: fix array bound error (jsc#SLE-24682).\n- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).\n- octeontx2-af: initialize action variable (jsc#SLE-24682).\n- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).\n- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).\n- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).\n- octeontx2-af: verify CQ context updates (jsc#SLE-24682).\n- octeontx2-nic: fix mixed module build (jsc#SLE-24682).\n- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).\n- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).\n- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).\n- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).\n- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).\n- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).\n- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).\n- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).\n- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).\n- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).\n- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).\n- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).\n- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).\n- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).\n- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).\n- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).\n- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).\n- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).\n- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).\n- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).\n- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).\n- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).\n- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).\n- pci: Add support for ACPI RST reset method (jsc#SLE-19359 jsc#SLE-24572).\n- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).\n- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).\n- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).\n- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).\n- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- platform/chrome: cros_ec: Always expose last resume result (git-fixes).\n- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- proc: fix a dentry lock race between release_task and lookup (git-fixes).\n- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).\n- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).\n- pwm: lpc18xx: Fix period handling (git-fixes).\n- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).\n- r8152: fix the RX FIFO settings when suspending (git-fixes).\n- r8152: fix the units of some registers for RTL8156A (git-fixes).\n- random: remove useless header comment (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).\n- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).\n- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).\n- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).\n- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).\n- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).\n- rose: check NULL rose_loopback_neigh->loopback (git-fixes).\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.\n- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.\n- rpm/kernel-source.spec.in: simplify finding of broken symlinks 'find -xtype l' will report them, so use that to make the search a bit faster (without using shell).\n- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).\n- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).\n- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).\n- s390/cpumf: Handle events cycles and instructions identical (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).\n- s390/hypfs: avoid error message under KVM (bsc#1032323).\n- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).\n- s390/stp: clock_delta should be signed (git-fixes).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/core: Do not requeue task on CPU excluded from cpus_mask (bnc#1199356).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).\n- sched/fair: Remove redundant word ' *' (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)\n- sched/uclamp: Fix rq->uclamp_max not set on first enqueue (git-fixes)\n- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh\n- sched: Remove unused function group_first_cpu() (bnc#1189999).\n- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).\n- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).\n- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).\n- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).\n- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).\n- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).\n- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).\n- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).\n- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: ufs: core: Fix another task management completion race (git-fixes).\n- scsi: ufs: core: Fix task management completion timeout race (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).\n- selftests: kvm: set rax before vmcall (git-fixes).\n- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).\n- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).\n- selinux: Add boundary check in put_entry() (git-fixes).\n- selinux: access superblock_security_struct in LSM blob way (git-fixes).\n- selinux: check return value of sel_make_avc_files (git-fixes).\n- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).\n- selinux: fix double free of cond_list on error paths (git-fixes).\n- selinux: fix memleak in security_read_state_kernel() (git-fixes).\n- selinux: fix misuse of mutex_is_locked() (git-fixes).\n- selinux: use correct type for context length (git-fixes).\n- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).\n- serial: 8250: Export ICR access helpers for internal use (git-fixes).\n- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).\n- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).\n- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).\n- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).\n- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).\n- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).\n- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).\n- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).\n- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- soundwire: qcom: Check device status before reading devid (git-fixes).\n- soundwire: qcom: fix device status array range (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: Fix simplification of devm_spi_register_controller (git-fixes).\n- spi: dt-bindings: cadence: add missing 'required' (git-fixes).\n- spi: dt-bindings: zynqmp-qspi: add missing 'required' (git-fixes).\n- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).\n- spi: spi-altera-dfl: Fix an error handling path (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and changed all octeontx2 modules as supported (jsc#SLE-24682)\n- supported.conf: mark lib/objagg supported as dependency of mlxsw\n- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)\n- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).\n- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).\n- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).\n- tracing: Have filter accept 'common_cpu' to be consistent (git-fixes).\n- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).\n- tty: 8250: Add support for Brainboxes PX cards (git-fixes).\n- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).\n- tty: n_gsm: Modify cr bit value when config requester (git-fixes).\n- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).\n- tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() (git-fixes).\n- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).\n- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).\n- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).\n- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).\n- tty: n_gsm: fix DM command (git-fixes).\n- tty: n_gsm: fix broken virtual tty handling (git-fixes).\n- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).\n- tty: n_gsm: fix flow control handling in tx path (git-fixes).\n- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).\n- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).\n- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).\n- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).\n- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).\n- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).\n- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).\n- tty: n_gsm: fix tty registration before control channel open (git-fixes).\n- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).\n- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).\n- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).\n- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).\n- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- udf: Fix crash after seekdir (bsc#1194592).\n- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).\n- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).\n- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).\n- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).\n- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).\n- usb: cdns3: fix random warning message when driver load (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).\n- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).\n- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).\n- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).\n- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).\n- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).\n- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).\n- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).\n- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).\n- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).\n- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- usb: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).\n- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).\n- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- vfio: Clear the caps->buf to NULL after free (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).\n- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).\n- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- wireless: Remove redundant 'flush_workqueue()' calls (bsc#1202131).\n- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).\n- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).\n- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).\n- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).\n- x86/sev: Save the negotiated GHCB version (bsc#1190497).\n- xen/gntdev: fix unmap notification order (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).\n- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).\n- xfs: fix use-after-free in xattr node block inactivation (git-fixes).\n- xfs: fold perag loop iteration logic into helper function (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: only bother with sync_filesystem during readonly remount (git-fixes).\n- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).\n- xfs: rename the next_agno perag iteration variable (git-fixes).\n- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).\n- xfs: revert 'xfs: actually bump warning counts when we send warnings' (git-fixes).\n- xfs: terminate perag iteration reliably on agcount (git-fixes).\n- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xfs: use setattr_copy to set vfs inode attributes (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-3288,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3288,openSUSE-SLE-15.4-2022-3288", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3288-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:3288-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20223288-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:3288-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html", }, { category: "self", summary: "SUSE Bug 1023051", url: "https://bugzilla.suse.com/1023051", }, { category: "self", summary: "SUSE Bug 1032323", url: "https://bugzilla.suse.com/1032323", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1189999", url: "https://bugzilla.suse.com/1189999", }, { category: "self", summary: "SUSE Bug 1190497", url: "https://bugzilla.suse.com/1190497", }, { category: "self", summary: "SUSE Bug 1192968", url: "https://bugzilla.suse.com/1192968", }, { category: "self", summary: "SUSE Bug 1194592", url: "https://bugzilla.suse.com/1194592", }, { category: "self", summary: "SUSE Bug 1194869", url: "https://bugzilla.suse.com/1194869", }, { category: "self", summary: "SUSE Bug 1194904", url: "https://bugzilla.suse.com/1194904", }, { category: "self", summary: "SUSE Bug 1195480", url: "https://bugzilla.suse.com/1195480", }, { category: "self", summary: "SUSE Bug 1195917", url: "https://bugzilla.suse.com/1195917", }, { category: "self", summary: "SUSE Bug 1196616", url: "https://bugzilla.suse.com/1196616", }, { category: "self", summary: "SUSE Bug 1197158", url: "https://bugzilla.suse.com/1197158", }, { category: "self", summary: "SUSE Bug 1197391", url: "https://bugzilla.suse.com/1197391", }, { category: "self", summary: "SUSE Bug 1197755", url: "https://bugzilla.suse.com/1197755", }, { category: "self", summary: "SUSE Bug 1197756", url: "https://bugzilla.suse.com/1197756", }, { category: "self", summary: "SUSE Bug 1197757", url: "https://bugzilla.suse.com/1197757", }, { category: "self", summary: "SUSE Bug 1197763", url: "https://bugzilla.suse.com/1197763", }, { category: "self", summary: "SUSE Bug 1198410", url: "https://bugzilla.suse.com/1198410", }, { category: "self", summary: "SUSE Bug 1198577", url: "https://bugzilla.suse.com/1198577", }, { category: "self", summary: "SUSE Bug 1198702", url: "https://bugzilla.suse.com/1198702", }, { category: "self", summary: "SUSE Bug 1198971", url: "https://bugzilla.suse.com/1198971", }, { category: "self", summary: "SUSE Bug 1199356", url: "https://bugzilla.suse.com/1199356", }, { category: "self", summary: "SUSE Bug 1199515", url: "https://bugzilla.suse.com/1199515", }, { category: "self", summary: "SUSE Bug 1200301", url: "https://bugzilla.suse.com/1200301", }, { category: "self", summary: "SUSE Bug 1200313", url: "https://bugzilla.suse.com/1200313", }, { category: "self", summary: "SUSE Bug 1200431", url: "https://bugzilla.suse.com/1200431", }, { category: "self", summary: "SUSE Bug 1200544", url: "https://bugzilla.suse.com/1200544", }, { category: "self", summary: "SUSE Bug 1200845", url: "https://bugzilla.suse.com/1200845", }, { category: "self", summary: "SUSE Bug 1200868", url: "https://bugzilla.suse.com/1200868", }, { category: "self", summary: "SUSE Bug 1200869", url: "https://bugzilla.suse.com/1200869", }, { category: "self", summary: "SUSE Bug 1200870", url: "https://bugzilla.suse.com/1200870", }, { category: "self", summary: "SUSE Bug 1200871", url: "https://bugzilla.suse.com/1200871", }, { category: "self", summary: "SUSE Bug 1200872", url: "https://bugzilla.suse.com/1200872", }, { category: "self", summary: "SUSE Bug 1200873", url: "https://bugzilla.suse.com/1200873", }, { category: "self", summary: "SUSE Bug 1201019", url: "https://bugzilla.suse.com/1201019", }, { category: "self", summary: "SUSE Bug 1201308", url: "https://bugzilla.suse.com/1201308", }, { category: "self", summary: "SUSE Bug 1201361", url: "https://bugzilla.suse.com/1201361", }, { category: "self", summary: "SUSE Bug 1201442", url: "https://bugzilla.suse.com/1201442", }, { category: "self", summary: "SUSE Bug 1201455", url: "https://bugzilla.suse.com/1201455", }, { category: "self", summary: "SUSE Bug 1201489", url: "https://bugzilla.suse.com/1201489", }, { category: "self", summary: "SUSE Bug 1201610", url: "https://bugzilla.suse.com/1201610", }, { category: "self", summary: "SUSE Bug 1201726", url: "https://bugzilla.suse.com/1201726", }, { category: "self", summary: "SUSE Bug 1201768", url: "https://bugzilla.suse.com/1201768", }, { category: "self", summary: "SUSE Bug 1201865", url: "https://bugzilla.suse.com/1201865", }, { category: "self", summary: "SUSE Bug 1201940", url: "https://bugzilla.suse.com/1201940", }, { category: "self", summary: "SUSE Bug 1201948", url: "https://bugzilla.suse.com/1201948", }, { category: "self", summary: "SUSE Bug 1201956", url: "https://bugzilla.suse.com/1201956", }, { category: "self", summary: "SUSE Bug 1202094", url: "https://bugzilla.suse.com/1202094", }, { category: "self", summary: "SUSE Bug 1202096", url: "https://bugzilla.suse.com/1202096", }, { category: "self", summary: "SUSE Bug 1202097", url: "https://bugzilla.suse.com/1202097", }, { category: "self", summary: "SUSE Bug 1202113", url: "https://bugzilla.suse.com/1202113", }, { category: "self", summary: "SUSE Bug 1202131", url: "https://bugzilla.suse.com/1202131", }, { category: "self", summary: "SUSE Bug 1202154", url: "https://bugzilla.suse.com/1202154", }, { category: "self", summary: "SUSE Bug 1202262", url: "https://bugzilla.suse.com/1202262", }, { category: "self", summary: "SUSE Bug 1202265", url: "https://bugzilla.suse.com/1202265", }, { category: "self", summary: "SUSE Bug 1202346", url: "https://bugzilla.suse.com/1202346", }, { category: "self", summary: "SUSE Bug 1202347", url: "https://bugzilla.suse.com/1202347", }, { category: "self", summary: "SUSE Bug 1202385", url: "https://bugzilla.suse.com/1202385", }, { category: "self", summary: "SUSE Bug 1202393", url: "https://bugzilla.suse.com/1202393", }, { category: "self", summary: "SUSE Bug 1202447", url: "https://bugzilla.suse.com/1202447", }, { category: "self", summary: "SUSE Bug 1202471", url: "https://bugzilla.suse.com/1202471", }, { category: "self", summary: "SUSE Bug 1202558", url: "https://bugzilla.suse.com/1202558", }, { category: "self", summary: "SUSE Bug 1202564", url: "https://bugzilla.suse.com/1202564", }, { category: "self", summary: "SUSE Bug 1202623", url: "https://bugzilla.suse.com/1202623", }, { category: "self", summary: "SUSE Bug 1202636", url: "https://bugzilla.suse.com/1202636", }, { category: "self", summary: "SUSE Bug 1202672", url: "https://bugzilla.suse.com/1202672", }, { category: "self", summary: "SUSE Bug 1202681", url: "https://bugzilla.suse.com/1202681", }, { category: "self", summary: "SUSE Bug 1202710", url: "https://bugzilla.suse.com/1202710", }, { category: "self", summary: "SUSE Bug 1202711", url: "https://bugzilla.suse.com/1202711", }, { category: "self", summary: "SUSE Bug 1202712", url: "https://bugzilla.suse.com/1202712", }, { category: "self", summary: "SUSE Bug 1202713", url: "https://bugzilla.suse.com/1202713", }, { category: "self", summary: "SUSE Bug 1202715", url: "https://bugzilla.suse.com/1202715", }, { category: "self", summary: "SUSE Bug 1202716", url: "https://bugzilla.suse.com/1202716", }, { category: "self", summary: "SUSE Bug 1202757", url: "https://bugzilla.suse.com/1202757", }, { category: "self", summary: "SUSE Bug 1202758", url: "https://bugzilla.suse.com/1202758", }, { category: "self", summary: "SUSE Bug 1202759", url: "https://bugzilla.suse.com/1202759", }, { category: "self", summary: "SUSE Bug 1202761", url: "https://bugzilla.suse.com/1202761", }, { category: "self", summary: "SUSE Bug 1202762", url: "https://bugzilla.suse.com/1202762", }, { category: "self", summary: "SUSE Bug 1202763", url: "https://bugzilla.suse.com/1202763", }, { category: "self", summary: "SUSE Bug 1202764", url: "https://bugzilla.suse.com/1202764", }, { category: "self", summary: "SUSE Bug 1202765", url: "https://bugzilla.suse.com/1202765", }, { category: "self", summary: "SUSE Bug 1202766", url: "https://bugzilla.suse.com/1202766", }, { category: "self", summary: "SUSE Bug 1202767", url: "https://bugzilla.suse.com/1202767", }, { category: "self", summary: "SUSE Bug 1202768", url: "https://bugzilla.suse.com/1202768", }, { category: "self", summary: "SUSE Bug 1202769", url: "https://bugzilla.suse.com/1202769", }, { category: "self", summary: "SUSE Bug 1202770", url: "https://bugzilla.suse.com/1202770", }, { category: "self", summary: "SUSE Bug 1202771", url: "https://bugzilla.suse.com/1202771", }, { category: "self", summary: "SUSE Bug 1202773", url: "https://bugzilla.suse.com/1202773", }, { category: "self", summary: "SUSE Bug 1202774", url: "https://bugzilla.suse.com/1202774", }, { category: "self", summary: "SUSE Bug 1202775", url: "https://bugzilla.suse.com/1202775", }, { category: "self", summary: "SUSE Bug 1202776", url: "https://bugzilla.suse.com/1202776", }, { category: "self", summary: "SUSE Bug 1202778", url: "https://bugzilla.suse.com/1202778", }, { category: "self", summary: "SUSE Bug 1202779", url: "https://bugzilla.suse.com/1202779", }, { category: "self", summary: "SUSE Bug 1202780", url: "https://bugzilla.suse.com/1202780", }, { category: "self", summary: "SUSE Bug 1202781", url: "https://bugzilla.suse.com/1202781", }, { category: "self", summary: "SUSE Bug 1202782", url: "https://bugzilla.suse.com/1202782", }, { category: "self", summary: "SUSE Bug 1202783", url: "https://bugzilla.suse.com/1202783", }, { category: "self", summary: "SUSE Bug 1202822", url: "https://bugzilla.suse.com/1202822", }, { category: "self", summary: "SUSE Bug 1202823", url: "https://bugzilla.suse.com/1202823", }, { category: "self", summary: "SUSE Bug 1202824", url: "https://bugzilla.suse.com/1202824", }, { category: "self", summary: "SUSE Bug 1202860", url: "https://bugzilla.suse.com/1202860", }, { category: "self", summary: "SUSE Bug 1202867", url: "https://bugzilla.suse.com/1202867", }, { category: "self", summary: "SUSE Bug 1202872", url: "https://bugzilla.suse.com/1202872", }, { category: "self", summary: "SUSE Bug 1202898", url: "https://bugzilla.suse.com/1202898", }, { category: "self", summary: "SUSE Bug 1202989", url: "https://bugzilla.suse.com/1202989", }, { category: "self", summary: "SUSE Bug 1203036", url: "https://bugzilla.suse.com/1203036", }, { category: "self", summary: "SUSE Bug 1203041", url: "https://bugzilla.suse.com/1203041", }, { category: "self", summary: "SUSE Bug 1203063", url: "https://bugzilla.suse.com/1203063", }, { category: "self", summary: "SUSE Bug 1203098", url: "https://bugzilla.suse.com/1203098", }, { category: "self", summary: "SUSE Bug 1203107", url: "https://bugzilla.suse.com/1203107", }, { category: "self", summary: "SUSE Bug 1203117", url: "https://bugzilla.suse.com/1203117", }, { category: "self", summary: "SUSE Bug 1203138", url: "https://bugzilla.suse.com/1203138", }, { category: "self", summary: "SUSE Bug 1203139", url: "https://bugzilla.suse.com/1203139", }, { category: "self", summary: "SUSE Bug 1203159", url: "https://bugzilla.suse.com/1203159", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2020-36516 page", url: "https://www.suse.com/security/cve/CVE-2020-36516/", }, { category: "self", summary: "SUSE CVE CVE-2021-33135 page", url: "https://www.suse.com/security/cve/CVE-2021-33135/", }, { category: "self", summary: "SUSE CVE CVE-2021-4037 page", url: "https://www.suse.com/security/cve/CVE-2021-4037/", }, { category: "self", summary: "SUSE CVE CVE-2022-1184 page", url: "https://www.suse.com/security/cve/CVE-2022-1184/", }, { category: "self", summary: "SUSE CVE CVE-2022-20368 page", url: "https://www.suse.com/security/cve/CVE-2022-20368/", }, { category: "self", summary: "SUSE CVE CVE-2022-20369 page", url: "https://www.suse.com/security/cve/CVE-2022-20369/", }, { category: "self", summary: "SUSE CVE CVE-2022-2585 page", url: "https://www.suse.com/security/cve/CVE-2022-2585/", }, { category: "self", summary: "SUSE CVE CVE-2022-2588 page", url: "https://www.suse.com/security/cve/CVE-2022-2588/", }, { category: "self", summary: "SUSE CVE CVE-2022-26373 page", url: "https://www.suse.com/security/cve/CVE-2022-26373/", }, { category: "self", summary: "SUSE CVE CVE-2022-2639 page", url: "https://www.suse.com/security/cve/CVE-2022-2639/", }, { category: "self", summary: "SUSE CVE CVE-2022-2663 page", url: "https://www.suse.com/security/cve/CVE-2022-2663/", }, { category: "self", summary: "SUSE CVE CVE-2022-28356 page", url: "https://www.suse.com/security/cve/CVE-2022-28356/", }, { category: "self", summary: "SUSE CVE CVE-2022-28693 page", url: "https://www.suse.com/security/cve/CVE-2022-28693/", }, { category: "self", summary: "SUSE CVE CVE-2022-2873 page", url: "https://www.suse.com/security/cve/CVE-2022-2873/", }, { category: "self", summary: "SUSE CVE CVE-2022-2905 page", url: "https://www.suse.com/security/cve/CVE-2022-2905/", }, { category: "self", summary: "SUSE CVE CVE-2022-2938 page", url: "https://www.suse.com/security/cve/CVE-2022-2938/", }, { category: "self", summary: "SUSE CVE CVE-2022-2959 page", url: "https://www.suse.com/security/cve/CVE-2022-2959/", }, { category: "self", summary: "SUSE CVE CVE-2022-2977 page", url: "https://www.suse.com/security/cve/CVE-2022-2977/", }, { category: "self", summary: "SUSE CVE CVE-2022-3028 page", url: "https://www.suse.com/security/cve/CVE-2022-3028/", }, { category: "self", summary: "SUSE CVE CVE-2022-3078 page", url: "https://www.suse.com/security/cve/CVE-2022-3078/", }, { category: "self", summary: "SUSE CVE CVE-2022-36879 page", url: "https://www.suse.com/security/cve/CVE-2022-36879/", }, { category: "self", summary: "SUSE CVE CVE-2022-36946 page", url: "https://www.suse.com/security/cve/CVE-2022-36946/", }, { category: "self", summary: "SUSE CVE CVE-2022-39188 page", url: "https://www.suse.com/security/cve/CVE-2022-39188/", }, { category: "self", summary: "SUSE CVE CVE-2022-39190 page", url: "https://www.suse.com/security/cve/CVE-2022-39190/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-09-16T08:38:48Z", generator: { date: "2022-09-16T08:38:48Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:3288-1", initial_release_date: "2022-09-16T08:38:48Z", revision_history: [ { date: "2022-09-16T08:38:48Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", product: { name: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", product_id: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", product: { name: "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", product_id: "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", product: { name: "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", product_id: "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150400.14.13.1.aarch64", product: { name: "kernel-azure-5.14.21-150400.14.13.1.aarch64", product_id: "kernel-azure-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", product: { name: "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", product_id: "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", product: { name: "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", product_id: "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", product: { name: "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", product_id: "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", product: { name: "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", product_id: "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", product: { name: "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", product_id: "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", product: { name: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", product_id: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", product: { name: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", product_id: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-azure-5.14.21-150400.14.13.1.noarch", product: { name: "kernel-devel-azure-5.14.21-150400.14.13.1.noarch", product_id: "kernel-devel-azure-5.14.21-150400.14.13.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.14.21-150400.14.13.1.noarch", product: { name: "kernel-source-azure-5.14.21-150400.14.13.1.noarch", product_id: "kernel-source-azure-5.14.21-150400.14.13.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", product: { name: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", product_id: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", product: { name: "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", product_id: "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", product: { name: "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", product_id: "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150400.14.13.1.x86_64", product: { name: "kernel-azure-5.14.21-150400.14.13.1.x86_64", product_id: "kernel-azure-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", product: { name: "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", product_id: "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", product: { name: "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", product_id: "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", product: { name: "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", product_id: "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", product: { name: "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", product_id: "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", product: { name: "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", product_id: "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", product: { name: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", product_id: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", product: { name: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", product_id: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.13.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150400.14.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150400.14.13.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150400.14.13.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150400.14.13.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150400.14.13.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150400.14.13.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150400.14.13.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150400.14.13.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2020-36516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36516", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36516", url: "https://www.suse.com/security/cve/CVE-2020-36516", }, { category: "external", summary: "SUSE Bug 1196616 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196616", }, { category: "external", summary: "SUSE Bug 1196867 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196867", }, { category: "external", summary: "SUSE Bug 1204092 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204092", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204183", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "important", }, ], title: "CVE-2020-36516", }, { cve: "CVE-2021-33135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-33135", }, ], notes: [ { category: "general", text: "Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-33135", url: "https://www.suse.com/security/cve/CVE-2021-33135", }, { category: "external", summary: "SUSE Bug 1199515 for CVE-2021-33135", url: "https://bugzilla.suse.com/1199515", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2021-33135", }, { cve: "CVE-2021-4037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4037", }, ], notes: [ { category: "general", text: "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4037", url: "https://www.suse.com/security/cve/CVE-2021-4037", }, { category: "external", summary: "SUSE Bug 1198702 for CVE-2021-4037", url: "https://bugzilla.suse.com/1198702", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2021-4037", }, { cve: "CVE-2022-1184", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1184", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel's filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1184", url: "https://www.suse.com/security/cve/CVE-2022-1184", }, { category: "external", summary: "SUSE Bug 1198577 for CVE-2022-1184", url: "https://bugzilla.suse.com/1198577", }, { category: "external", summary: "SUSE Bug 1210859 for CVE-2022-1184", url: "https://bugzilla.suse.com/1210859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-1184", }, { cve: "CVE-2022-20368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20368", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20368", url: "https://www.suse.com/security/cve/CVE-2022-20368", }, { category: "external", summary: "SUSE Bug 1202346 for CVE-2022-20368", url: "https://bugzilla.suse.com/1202346", }, { category: "external", summary: "SUSE Bug 1212311 for CVE-2022-20368", url: "https://bugzilla.suse.com/1212311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20369", }, ], notes: [ { category: "general", text: "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20369", url: "https://www.suse.com/security/cve/CVE-2022-20369", }, { category: "external", summary: "SUSE Bug 1202347 for CVE-2022-20369", url: "https://bugzilla.suse.com/1202347", }, { category: "external", summary: "SUSE Bug 1212321 for CVE-2022-20369", url: "https://bugzilla.suse.com/1212321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-20369", }, { cve: "CVE-2022-2585", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2585", }, ], notes: [ { category: "general", text: "It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2585", url: "https://www.suse.com/security/cve/CVE-2022-2585", }, { category: "external", summary: "SUSE Bug 1202094 for CVE-2022-2585", url: "https://bugzilla.suse.com/1202094", }, { category: "external", summary: "SUSE Bug 1202163 for CVE-2022-2585", url: "https://bugzilla.suse.com/1202163", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "important", }, ], title: "CVE-2022-2585", }, { cve: "CVE-2022-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2588", }, ], notes: [ { category: "general", text: "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2588", url: "https://www.suse.com/security/cve/CVE-2022-2588", }, { category: "external", summary: "SUSE Bug 1202096 for CVE-2022-2588", url: "https://bugzilla.suse.com/1202096", }, { category: "external", summary: "SUSE Bug 1203613 for CVE-2022-2588", url: "https://bugzilla.suse.com/1203613", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2022-2588", url: "https://bugzilla.suse.com/1204183", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-2588", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "important", }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-26373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26373", }, ], notes: [ { category: "general", text: "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26373", url: "https://www.suse.com/security/cve/CVE-2022-26373", }, { category: "external", summary: "SUSE Bug 1201726 for CVE-2022-26373", url: "https://bugzilla.suse.com/1201726", }, { category: "external", summary: "SUSE Bug 1209619 for CVE-2022-26373", url: "https://bugzilla.suse.com/1209619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2639", }, ], notes: [ { category: "general", text: "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2639", url: "https://www.suse.com/security/cve/CVE-2022-2639", }, { category: "external", summary: "SUSE Bug 1202154 for CVE-2022-2639", url: "https://bugzilla.suse.com/1202154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-2639", }, { cve: "CVE-2022-2663", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2663", }, ], notes: [ { category: "general", text: "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2663", url: "https://www.suse.com/security/cve/CVE-2022-2663", }, { category: "external", summary: "SUSE Bug 1202097 for CVE-2022-2663", url: "https://bugzilla.suse.com/1202097", }, { category: "external", summary: "SUSE Bug 1212299 for CVE-2022-2663", url: "https://bugzilla.suse.com/1212299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-2663", }, { cve: "CVE-2022-28356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28356", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28356", url: "https://www.suse.com/security/cve/CVE-2022-28356", }, { category: "external", summary: "SUSE Bug 1197391 for CVE-2022-28356", url: "https://bugzilla.suse.com/1197391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-28356", }, { cve: "CVE-2022-28693", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28693", }, ], notes: [ { category: "general", text: "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28693", url: "https://www.suse.com/security/cve/CVE-2022-28693", }, { category: "external", summary: "SUSE Bug 1201455 for CVE-2022-28693", url: "https://bugzilla.suse.com/1201455", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-28693", }, { cve: "CVE-2022-2873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2873", }, ], notes: [ { category: "general", text: "An out-of-bounds memory access flaw was found in the Linux kernel Intel's iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2873", url: "https://www.suse.com/security/cve/CVE-2022-2873", }, { category: "external", summary: "SUSE Bug 1202558 for CVE-2022-2873", url: "https://bugzilla.suse.com/1202558", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-2873", }, { cve: "CVE-2022-2905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2905", }, ], notes: [ { category: "general", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2905", url: "https://www.suse.com/security/cve/CVE-2022-2905", }, { category: "external", summary: "SUSE Bug 1202860 for CVE-2022-2905", url: "https://bugzilla.suse.com/1202860", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-2938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2938", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2938", url: "https://www.suse.com/security/cve/CVE-2022-2938", }, { category: "external", summary: "SUSE Bug 1202623 for CVE-2022-2938", url: "https://bugzilla.suse.com/1202623", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-2938", }, { cve: "CVE-2022-2959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2959", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2959", url: "https://www.suse.com/security/cve/CVE-2022-2959", }, { category: "external", summary: "SUSE Bug 1202681 for CVE-2022-2959", url: "https://bugzilla.suse.com/1202681", }, { category: "external", summary: "SUSE Bug 1202685 for CVE-2022-2959", url: "https://bugzilla.suse.com/1202685", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "important", }, ], title: "CVE-2022-2959", }, { cve: "CVE-2022-2977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2977", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2977", url: "https://www.suse.com/security/cve/CVE-2022-2977", }, { category: "external", summary: "SUSE Bug 1202672 for CVE-2022-2977", url: "https://bugzilla.suse.com/1202672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-2977", }, { cve: "CVE-2022-3028", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3028", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3028", url: "https://www.suse.com/security/cve/CVE-2022-3028", }, { category: "external", summary: "SUSE Bug 1202898 for CVE-2022-3028", url: "https://bugzilla.suse.com/1202898", }, { category: "external", summary: "SUSE Bug 1212296 for CVE-2022-3028", url: "https://bugzilla.suse.com/1212296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-3078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3078", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3078", url: "https://www.suse.com/security/cve/CVE-2022-3078", }, { category: "external", summary: "SUSE Bug 1203041 for CVE-2022-3078", url: "https://bugzilla.suse.com/1203041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "low", }, ], title: "CVE-2022-3078", }, { cve: "CVE-2022-36879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36879", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36879", url: "https://www.suse.com/security/cve/CVE-2022-36879", }, { category: "external", summary: "SUSE Bug 1201948 for CVE-2022-36879", url: "https://bugzilla.suse.com/1201948", }, { category: "external", summary: "SUSE Bug 1212327 for CVE-2022-36879", url: "https://bugzilla.suse.com/1212327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36946", }, ], notes: [ { category: "general", text: "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36946", url: "https://www.suse.com/security/cve/CVE-2022-36946", }, { category: "external", summary: "SUSE Bug 1201940 for CVE-2022-36946", url: "https://bugzilla.suse.com/1201940", }, { category: "external", summary: "SUSE Bug 1201941 for CVE-2022-36946", url: "https://bugzilla.suse.com/1201941", }, { category: "external", summary: "SUSE Bug 1202312 for CVE-2022-36946", url: "https://bugzilla.suse.com/1202312", }, { category: "external", summary: "SUSE Bug 1202874 for CVE-2022-36946", url: "https://bugzilla.suse.com/1202874", }, { category: "external", summary: "SUSE Bug 1203208 for CVE-2022-36946", url: "https://bugzilla.suse.com/1203208", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-36946", url: "https://bugzilla.suse.com/1204132", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-36946", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1212310 for CVE-2022-36946", url: "https://bugzilla.suse.com/1212310", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "important", }, ], title: "CVE-2022-36946", }, { cve: "CVE-2022-39188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39188", }, ], notes: [ { category: "general", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39188", url: "https://www.suse.com/security/cve/CVE-2022-39188", }, { category: "external", summary: "SUSE Bug 1203107 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203107", }, { category: "external", summary: "SUSE Bug 1203116 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203116", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-39188", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-39188", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1212326 for CVE-2022-39188", url: "https://bugzilla.suse.com/1212326", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39190", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39190", }, ], notes: [ { category: "general", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39190", url: "https://www.suse.com/security/cve/CVE-2022-39190", }, { category: "external", summary: "SUSE Bug 1203117 for CVE-2022-39190", url: "https://bugzilla.suse.com/1203117", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.13.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.13.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.13.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T08:38:48Z", details: "moderate", }, ], title: "CVE-2022-39190", }, ], }
suse-su-2022:3293-1
Vulnerability from csaf_suse
Published
2022-09-16 15:30
Modified
2022-09-16 15:30
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bnc#1203041).
- CVE-2022-28356: Fixed a refcount leak bug that was found in net/llc/af_llc.c (bnc#1197391).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bnc#1202623).
- CVE-2022-28693: Fixed x86/speculation behavior by disabling RRSBA (bsc#1201455).
- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1199515).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bnc#1202681 bnc#1202685).
- CVE-2022-36946: Fixed a denial of service (panic) inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940 bnc#1201941 bnc#1202312 bnc#1202874).
- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).
- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bnc#1202558).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2022-32250: Fixed a privilege escalation issue in net/netfilter/nf_tables_api.c that allowed a local user to became root (bnc#1200015).
The following non-security bugs were fixed:
- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).
- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).
- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).
- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: VIOT: Fix ACS setup (git-fixes).
- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: thermal: drop an always true check (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).
- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).
- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Add endianness annotations (git-fixes).
- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).
- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).
- ALSA: usb-audio: Turn off 'manual mode' on Dell dock (git-fixes).
- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).
- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).
- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).
- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).
- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).
- ARM: dts: ast2500-evb: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb: fix board compatible (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).
- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).
- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).
- ARM: dts: imx6ul: add missing properties for sram (git-fixes).
- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).
- ARM: dts: imx6ul: fix csi node compatible (git-fixes).
- ARM: dts: imx6ul: fix keypad compatible (git-fixes).
- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).
- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).
- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).
- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).
- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).
- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).
- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).
- ARM: findbit: fix overflowing offset (git-fixes).
- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).
- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).
- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).
- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).
- ASoC: imx-audmux: Silence a clang warning (git-fixes).
- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).
- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).
- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).
- ASoC: mt6359: Fix refcount leak bug (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).
- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).
- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).
- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).
- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).
- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).
- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).
- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).
- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).
- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).
- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).
- Bluetooth: SCO: Fix sco_send_frame returning skb->len (git-fixes).
- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).
- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).
- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).
- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).
- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).
- HID: add Lenovo Yoga C630 battery quirk (git-fixes).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: amd_sfh: Add NULL check for hid device (git-fixes).
- HID: amd_sfh: Handle condition of 'no sensors' (git-fixes).
- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- HID: hid-input: add Surface Go battery quirk (git-fixes).
- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).
- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).
- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).
- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).
- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - merge quirk tables (git-fies).
- Input: i8042 - move __initconst to fix code styling warning (git-fies).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- KABI: cgroup: Restore KABI of css_set (bsc#1201610).
- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).
- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).
- KVM: MMU: shadow nested paging does not have PKU (git-fixes).
- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).
- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).
- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).
- KVM: SVM: Unwind 'speculative' RIP advancement if INTn injection 'fails' (git-fixes).
- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).
- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).
- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).
- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).
- KVM: X86: Use vcpu->arch.walk_mmu for kvm_mmu_invlpg() (git-fixes).
- KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).
- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).
- KVM: nVMX: do not use vcpu->arch.efer when checking host state on nested state load (git-fixes).
- KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE (git-fixes).
- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).
- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).
- KVM: x86/mmu: Move 'invalid' check out of kvm_tdp_mmu_get_root() (git-fixes).
- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).
- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).
- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).
- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).
- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).
- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).
- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb() (git-fixes).
- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).
- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).
- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (git-fixes).
- NFSD: Fix ia_size underflow (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI/AER: Iterate over error counters instead of error strings (git-fixes).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).
- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).
- SUNRPC: Fix NFSD's request deferral on RDMA transports (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: ch341: fix lost character on LCR updates (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- XArray: Update the LRU list in xas_split() (git-fixes).
- apparmor: Fix failed mount permission check error message (git-fixes).
- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).
- apparmor: fix aa_label_asxprint return check (git-fixes).
- apparmor: fix absroot causing audited secids to begin with = (git-fixes).
- apparmor: fix overlapping attachment computation (git-fixes).
- apparmor: fix quiet_denied for file rules (git-fixes).
- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).
- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).
- arm64: Do not forget syscall when starting a new thread (git-fixes).
- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).
- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).
- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).
- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).
- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).
- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).
- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).
- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).
- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).
- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).
- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).
- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).
- arm64: fix rodata=full (git-fixes).
- arm64: kasan: Revert 'arm64: mte: reset the page tag in page->flags' (git-fixes).
- arm64: set UXN on swapper page tables (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).
- arm64: tegra: Fixup SYSRAM references (git-fixes).
- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).
- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).
- arm_pmu: Validate single/group leader events (git-fixes).
- asm-generic: remove a broken and needless ifdef conditional (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ath11k: Fix incorrect debug_mask mappings (git-fixes).
- ath11k: fix netdev open race (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).
- ax25: Fix ax25 session cleanup problems (git-fixes).
- bitfield.h: Fix 'type of reg too small for mask' test (git-fixes).
- block: Fix fsync always failed if once failed (bsc#1202779).
- block: Fix wrong offset in bio_truncate() (bsc#1202780).
- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).
- block: only mark bio as tracked if it really is tracked (bsc#1202782).
- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).
- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).
- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: mcp251x: Fix race condition on receive interrupt (git-fixes).
- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).
- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).
- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).
- ceph: do not truncate file in atomic_open (bsc#1202824).
- ceph: use correct index when encoding client supported features (bsc#1202822).
- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- cifs: fix reconnect on smb3 mount types (bsc#1201427).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: mediatek: reset: Fix written reset bit offset (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver's init level (git-fixes).
- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).
- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).
- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).
- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).
- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).
- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).
- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).
- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).
- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).
- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).
- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).
- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).
- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).
- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).
- crypto: hisilicon/sec - fix auth key size error (git-fixes).
- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).
- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).
- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).
- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).
- device property: Check fwnode->secondary when finding properties (git-fixes).
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).
- dma-debug: make things less spammy under memory pressure (git-fixes).
- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).
- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).
- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).
- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).
- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).
- docs/kernel-parameters: Update descriptions for 'mitigations=' param with retbleed (git-fixes).
- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).
- docs: zh_CN: fix a broken reference (git-fixes).
- dpaa2-eth: fix ethtool statistics (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drivers/iio: Remove all strcpy() uses (git-fixes).
- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).
- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).
- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).
- drm/amd/display: Avoid MPC infinite loop (git-fixes).
- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).
- drm/amd/display: Fix pixel clock programming (git-fixes).
- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).
- drm/amd/display: For stereo keep 'FLIP_ANY_FRAME' (git-fixes).
- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).
- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).
- drm/amd/display: Reset DMCUB before HW init (git-fixes).
- drm/amd/display: Revert 'drm/amd/display: turn DPMS off on connector unplug' (git-fixes).
- drm/amd/display: avoid doing vm_init multiple time (git-fixes).
- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).
- drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).
- drm/amdgpu: Remove one duplicated ef removal (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/bridge: lt9611uxc: Cancel only driver's work (git-fixes).
- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).
- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/i915: fix null pointer dereference (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: Allow commands to be sent during video mode (git-fixes).
- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).
- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).
- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).
- drm/msm/dpu: Fix for non-visible planes (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/hdmi: drop empty 'none' regulator lists (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).
- drm/msm: Fix dirtyfb refcounting (git-fixes).
- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).
- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).
- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/nouveau: recognise GA103 (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/shmem-helper: Add missing vunmap on error (git-fixes).
- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).
- drm/udl: Add parameter to set number of URBs (bsc#1195917).
- drm/udl: Add reset_resume (bsc#1195917)
- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).
- drm/udl: Drop unneeded alignment (bsc#1195917).
- drm/udl: Enable damage clipping (bsc#1195917).
- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).
- drm/udl: Fix potential URB leaks (bsc#1195917).
- drm/udl: Increase the default URB list size to 20 (bsc#1195917).
- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).
- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).
- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).
- drm/udl: Restore display mode on resume (bsc#1195917)
- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).
- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).
- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).
- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).
- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).
- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).
- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).
- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).
- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).
- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).
- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).
- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).
- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).
- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).
- erofs: fix deadlock when shrink erofs slab (git-fixes).
- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).
- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).
- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).
- exfat: Drop superfluous new line for error messages (bsc#1201725).
- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).
- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix referencing wrong parent directory information after renaming (git-fixes).
- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).
- exfat: use updated exfat_chain directly during renaming (git-fixes).
- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).
- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).
- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769).
- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).
- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).
- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).
- ext4: fix null-ptr-deref in '__ext4_journal_ensure_credits' (bsc#1202764).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix super block checksum incorrect after mount (bsc#1202773).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).
- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).
- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).
- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).
- fat: add ratelimit to fat*_ent_bread() (git-fixes).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).
- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).
- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).
- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fix race between exit_itimers() and /proc/pid/timers (git-fixes).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- ftrace/x86: Add back ftrace_expected assignment (git-fixes).
- fuse: ioctl: translate ENOSYS (bsc#1203139).
- fuse: limit nsec (bsc#1203138).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- habanalabs/gaudi: fix shift out of bounds (git-fixes).
- habanalabs/gaudi: mask constant value before cast (git-fixes).
- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).
- hwmon: (drivetemp) Add module alias (git-fixes).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).
- i2c: Fix a potential use after free (git-fixes).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- i2c: mxs: Silence a clang warning (git-fixes).
- i2c: npcm: Capitalize the one-line comment (git-fixes).
- i2c: npcm: Correct slave role behavior (git-fixes).
- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).
- ice: fix 'scheduling while atomic' on aux critical err interrupt (git-fixes).
- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).
- ieee80211: change HE nominal packet padding value defines (bsc#1202131).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).
- iio: accel: bma400: Reordering of header files (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).
- iio: ad7292: Prevent regulator double disable (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: common: ssp: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).
- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).
- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- interconnect: imx: fix max_node_id (git-fixes).
- io_uring: add a schedule point in io_add_buffers() (git-fixes).
- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).
- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).
- iommu/amd: Enable swiotlb in all cases (git-fixes).
- iommu/amd: Fix I/O page table memory leak (git-fixes).
- iommu/amd: Recover from event log overflow (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).
- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/dart: Add missing module owner to ops structure (git-fixes).
- iommu/dart: check return value after calling platform_get_resource() (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).
- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).
- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).
- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).
- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Drop stop marker messages (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).
- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).
- iommu/vt-d: Remove global g_iommus array (bsc#1200301).
- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).
- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).
- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- iommu: Fix potential use-after-free during probe (git-fixes).
- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).
- iov_iter: fix build issue due to possible type mis-match (git-fixes).
- ipmi: fix initialization when workqueue allocation fails (git-fixes).
- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).
- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).
- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).
- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).
- iwlwifi: Add support for more BZ HWs (bsc#1202131).
- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).
- iwlwifi: BZ Family SW reset support (bsc#1202131).
- iwlwifi: Configure FW debug preset via module param (bsc#1202131).
- iwlwifi: Fix FW name for gl (bsc#1202131).
- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).
- iwlwifi: Fix syntax errors in comments (bsc#1202131).
- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).
- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).
- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).
- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).
- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).
- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).
- iwlwifi: add new Qu-Hr device (bsc#1202131).
- iwlwifi: add new ax1650 killer device (bsc#1202131).
- iwlwifi: add new device id 7F70 (bsc#1202131).
- iwlwifi: add new pci SoF with JF (bsc#1202131).
- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).
- iwlwifi: add support for BNJ HW (bsc#1202131).
- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).
- iwlwifi: add support for Bz-Z HW (bsc#1202131).
- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).
- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).
- iwlwifi: allow rate-limited error messages (bsc#1202131).
- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).
- iwlwifi: api: remove ttl field from TX command (bsc#1202131).
- iwlwifi: api: remove unused RX status bits (bsc#1202131).
- iwlwifi: avoid variable shadowing (bsc#1202131).
- iwlwifi: avoid void pointer arithmetic (bsc#1202131).
- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).
- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).
- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).
- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).
- iwlwifi: dbg: check trigger data before access (bsc#1202131).
- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).
- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).
- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).
- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).
- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).
- iwlwifi: de-const properly where needed (bsc#1202131).
- iwlwifi: debugfs: remove useless double condition (bsc#1202131).
- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).
- iwlwifi: do not use __unused as variable name (bsc#1202131).
- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).
- iwlwifi: dump CSR scratch from outer function (bsc#1202131).
- iwlwifi: dump RCM error tables (bsc#1202131).
- iwlwifi: dump both TCM error tables if present (bsc#1202131).
- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).
- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: eeprom: clean up macros (bsc#1202131).
- iwlwifi: fix LED dependencies (bsc#1202131).
- iwlwifi: fix debug TLV parsing (bsc#1202131).
- iwlwifi: fix fw/img.c license statement (bsc#1202131).
- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).
- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).
- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).
- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).
- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).
- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).
- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).
- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).
- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).
- iwlwifi: fw: make dump_start callback void (bsc#1202131).
- iwlwifi: fw: remove dead error log code (bsc#1202131).
- iwlwifi: implement reset flow for Bz devices (bsc#1202131).
- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).
- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).
- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).
- iwlwifi: make some functions friendly to sparse (bsc#1202131).
- iwlwifi: move symbols into a separate namespace (bsc#1202131).
- iwlwifi: mvm/api: define system control command (bsc#1202131).
- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).
- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).
- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).
- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).
- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).
- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).
- iwlwifi: mvm: Do not fail if PPAG isn't supported (bsc#1202131).
- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).
- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).
- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).
- iwlwifi: mvm: Remove antenna c references (bsc#1202131).
- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).
- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).
- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).
- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).
- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).
- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).
- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).
- iwlwifi: mvm: add US/CA to TAS block list if OEM isn't allowed (bsc#1202131).
- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).
- iwlwifi: mvm: add definitions for new rate & flags (bsc#1202131).
- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).
- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).
- iwlwifi: mvm: add some missing command strings (bsc#1202131).
- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).
- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).
- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).
- iwlwifi: mvm: add support for OCE scan (bsc#1202131).
- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).
- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).
- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).
- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).
- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).
- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).
- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).
- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).
- iwlwifi: mvm: convert old rate & flags to the new format (bsc#1202131).
- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).
- iwlwifi: mvm: correctly set channel flags (bsc#1202131).
- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).
- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).
- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).
- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).
- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).
- iwlwifi: mvm: do not get address of mvm->fwrt just to dereference as a pointer (bsc#1202131).
- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).
- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).
- iwlwifi: mvm: drop too short packets silently (bsc#1202131).
- iwlwifi: mvm: extend session protection on association (bsc#1202131).
- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).
- iwlwifi: mvm: fix a stray tab (bsc#1202131).
- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).
- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).
- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).
- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).
- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).
- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).
- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).
- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).
- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).
- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).
- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).
- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).
- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).
- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).
- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).
- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).
- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).
- iwlwifi: mvm: remove card state notification code (bsc#1202131).
- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).
- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).
- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).
- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).
- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).
- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).
- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).
- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).
- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).
- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).
- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).
- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).
- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).
- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).
- iwlwifi: mvm: support RLC configuration command (bsc#1202131).
- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).
- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).
- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).
- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).
- iwlwifi: mvm: update RFI TLV (bsc#1202131).
- iwlwifi: mvm: update definitions due to new rate & flags (bsc#1202131).
- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).
- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).
- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).
- iwlwifi: nvm: Correct HE capability (bsc#1202131).
- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).
- iwlwifi: parse error tables from debug TLVs (bsc#1202131).
- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).
- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).
- iwlwifi: pcie: add support for MS devices (bsc#1202131).
- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).
- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).
- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).
- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).
- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).
- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).
- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).
- iwlwifi: pcie: remove duplicate entry (bsc#1202131).
- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).
- iwlwifi: pcie: retake ownership after reset (bsc#1202131).
- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).
- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).
- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).
- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).
- iwlwifi: pnvm: print out the version properly (bsc#1202131).
- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).
- iwlwifi: propagate (const) type qualifier (bsc#1202131).
- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).
- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).
- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).
- iwlwifi: remove contact information (bsc#1202131).
- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).
- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).
- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).
- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).
- iwlwifi: remove unused macros (bsc#1202131).
- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).
- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).
- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).
- iwlwifi: scan: Modify return value of a function (bsc#1202131).
- iwlwifi: support 4-bits in MAC step value (bsc#1202131).
- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).
- iwlwifi: support new queue allocation command (bsc#1202131).
- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).
- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).
- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).
- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).
- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).
- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).
- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).
- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).
- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).
- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).
- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).
- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).
- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).
- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).
- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).
- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).
- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).
- kabi/severities: Exclude ppc kvm
- kabi/severities: add Qlogic qed symbols
- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471
- kabi/severities: add hisilicon hns3 symbols
- kabi/severities: add microchip dsa drivers
- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.
- kabi/severities: octeontx2 driver (jsc#SLE-24682)
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kbuild: fix the modules order between drivers and libs (git-fixes).
- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).
- kcm: fix strp_init() order and cleanup (git-fies).
- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).
- kselftest/vm: fix tests build with old libc (git-fixes).
- kselftest: Fix vdso_test_abi return status (git-fixes).
- kselftest: signal all child processes (git-fixes).
- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).
- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).
- landlock: Add clang-format exceptions (git-fixes).
- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).
- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).
- landlock: Create find_rule() from unmask_layers() (git-fixes).
- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).
- landlock: Fix landlock_add_rule(2) documentation (git-fixes).
- landlock: Fix same-layer rule unions (git-fixes).
- landlock: Format with clang-format (git-fixes).
- landlock: Reduce the maximum number of layers to 16 (git-fixes).
- landlock: Use square brackets around 'landlock-ruleset' (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib/raid6/test: fix multiple definition linking error (git-fixes).
- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).
- lkdtm: Disable return thunks in rodata.c (bsc#1190497).
- lockdep: Correct lock_classes index mapping (git-fixes).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).
- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).
- loop: Check for overflow while configuring loop (git-fies).
- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).
- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).
- mac80211: fix a memory leak where sta_info is not freed (git-fixes).
- mac80211: introduce channel switch disconnect function (bsc#1202131).
- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).
- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).
- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).
- macsec: limit replay window size with XPN (git-fixes).
- marvell: octeontx2: build error: unknown type name 'u64' (jsc#SLE-24682).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).
- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).
- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).
- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).
- media: cedrus: h265: Fix flag name (git-fixes).
- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).
- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).
- media: hantro: postproc: Fix motion vector space size (git-fixes).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: hevc: Embedded indexes in RPS (git-fixes).
- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).
- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).
- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).
- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).
- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- minix: fix bug when opening a file with O_DIRECT (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mmc: block: Add single read for 4k sector cards (git-fixes).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).
- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).
- mmc: mxcmmc: Silence a clang warning (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- mmc: tmio: avoid glitches when resetting (git-fixes).
- msft-hv-2570-hv_netvsc: Add support for XDP_REDIRECT (bsc#1199364).
- mt76: mt7615: do not update pm stats in case of error (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).
- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).
- mtd: dataflash: Add SPI ID table (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).
- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).
- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).
- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).
- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).
- n_gsm: remove unused parameters from gsm_error() (git-fixes).
- net: asix: fix 'can't send until first packet is send' issue (git-fixes).
- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).
- net: dsa: b53: Add SPI ID table (git-fixes).
- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).
- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).
- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).
- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).
- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).
- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).
- net: dsa: microchip: implement multi-bridge support (git-fixes).
- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).
- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).
- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).
- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).
- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).
- net: dsa: mv88e6xxx: Unforce speed & duplex in mac_link_down() (git-fixes).
- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).
- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).
- net: dsa: mv88e6xxx: fix 'do not use PHY_DETECT on internal PHY's' (git-fixes).
- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).
- net: dsa: qca8k: fix MTU calculation (git-fixes).
- net: dsa: seville: register the mdiobus under devres (git-fixes).
- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: hns3: clean residual vf config after disable sriov (git-fixes).
- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).
- net: marvell: prestera: fix incorrect structure access (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).
- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).
- net: mscc: ocelot: set up traps for PTP packets (git-fixes).
- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).
- net: openvswitch: fix leak of nested actions (git-fixes).
- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).
- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).
- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).
- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).
- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).
- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmmac: clean up impossible condition (git-fixes).
- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).
- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).
- net: stmmac: fix off-by-one error in sanity check (git-fixes).
- net: usb: Correct PHY handling of smsc95xx (git-fixes).
- net: usb: Correct reset handling of smsc95xx (git-fixes).
- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).
- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).
- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).
- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).
- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).
- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).
- nouveau/svm: Fix to migrate all requested pages (git-fixes).
- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).
- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).
- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).
- nvme-auth: retry command if DNR bit is not set (bsc#1201675).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme: consider also host_iface when checking ip options (bsc#1199670).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvme: implement In-Band authentication (jsc#SLE-20183).
- nvme: kabi fixes for in-band authentication (bsc#1199086).
- nvmet-auth: expire authentication sessions (jsc#SLE-20183).
- nvmet: Expose max queues to configfs (bsc#1201865).
- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).
- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).
- ocfs2: fix a deadlock when commit trans (bsc#1202776).
- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).
- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).
- octeontx2-af: Add SDP interface support (jsc#SLE-24682).
- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).
- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).
- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).
- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).
- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).
- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).
- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).
- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).
- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).
- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).
- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).
- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).
- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).
- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).
- octeontx2-af: Fix spelling mistake 'Makesure' -> 'Make sure' (jsc#SLE-24682).
- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).
- octeontx2-af: Flow control resource management (jsc#SLE-24682).
- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).
- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).
- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).
- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).
- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).
- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).
- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).
- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).
- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).
- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).
- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).
- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).
- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).
- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).
- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).
- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).
- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).
- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).
- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).
- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).
- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).
- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).
- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).
- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).
- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).
- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).
- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).
- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).
- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).
- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).
- octeontx2-af: fix array bound error (jsc#SLE-24682).
- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).
- octeontx2-af: initialize action variable (jsc#SLE-24682).
- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).
- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).
- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).
- octeontx2-af: verify CQ context updates (jsc#SLE-24682).
- octeontx2-nic: fix mixed module build (jsc#SLE-24682).
- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).
- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).
- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).
- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).
- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).
- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).
- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).
- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).
- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).
- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).
- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).
- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).
- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).
- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).
- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).
- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).
- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).
- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).
- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).
- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).
- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).
- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).
- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).
- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).
- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).
- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).
- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).
- openvswitch: always update flow key after nat (git-fixes).
- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).
- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).
- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).
- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).
- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).
- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).
- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).
- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).
- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- platform/chrome: cros_ec: Always expose last resume result (git-fixes).
- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- proc: fix a dentry lock race between release_task and lookup (git-fixes).
- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).
- profiling: fix shift too large makes kernel panic (git-fixes).
- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).
- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).
- pwm: lpc18xx: Fix period handling (git-fixes).
- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).
- r8152: fix the RX FIFO settings when suspending (git-fixes).
- r8152: fix the units of some registers for RTL8156A (git-fixes).
- random: remove useless header comment (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).
- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).
- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).
- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).
- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).
- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).
- rose: check NULL rose_loopback_neigh->loopback (git-fixes).
- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385)
- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).
- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).
- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).
- s390/cpumf: Handle events cycles and instructions identical (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).
- s390/hypfs: avoid error message under KVM (bsc#1032323).
- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).
- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).
- s390/stp: clock_delta should be signed (git-fixes).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- samples/landlock: Add clang-format exceptions (git-fixes).
- samples/landlock: Fix path_list memory leak (git-fixes).
- samples/landlock: Format with clang-format (git-fixes).
- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).
- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).
- sched/fair: Remove redundant word ' *' (bnc#1189999 (Scheduler functional and performance backports)).
- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)
- sched/uclamp: Fix rq->uclamp_max not set on first enqueue (git-fixes)
- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh
- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).
- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).
- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).
- scripts/gdb: change kernel config dumping method (git-fixes).
- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).
- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).
- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).
- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).
- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).
- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).
- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).
- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).
- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).
- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: megaraid: Clear READ queue map's nr_queues (git-fixes).
- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).
- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).
- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).
- scsi: qla2xxx: Fix imbalance vha->vref_count (bsc#1201958).
- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).
- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).
- scsi: qla2xxx: Update manufacturer details (bsc#1201958).
- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).
- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).
- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: ufs: core: Fix another task management completion race (git-fixes).
- scsi: ufs: core: Fix task management completion timeout race (git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).
- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).
- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).
- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).
- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).
- selftest/vm: verify mmap addr in mremap_test (git-fixes).
- selftest/vm: verify remap destination address in mremap_test (git-fixes).
- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).
- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).
- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).
- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).
- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).
- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).
- selftests/landlock: Add clang-format exceptions (git-fixes).
- selftests/landlock: Add tests for O_PATH (git-fixes).
- selftests/landlock: Add tests for unknown access rights (git-fixes).
- selftests/landlock: Extend access right tests to directories (git-fixes).
- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).
- selftests/landlock: Format with clang-format (git-fixes).
- selftests/landlock: Fully test file rename with 'remove' access (git-fixes).
- selftests/landlock: Make tests build with old libc (git-fixes).
- selftests/landlock: Normalize array assignment (git-fixes).
- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).
- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).
- selftests/memfd: remove unused variable (git-fixes).
- selftests/net: pass ipv6_args to udpgso_bench's IPv6 TCP test (git-fixes).
- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).
- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).
- selftests/net: timestamping: Fix bind_phc check (git-fixes).
- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).
- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).
- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).
- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).
- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).
- selftests/rseq: Fix ppc32 missing instruction selection 'u' and 'x' for load/store (git-fixes).
- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).
- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).
- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).
- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).
- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).
- selftests/rseq: Introduce thread pointer getters (git-fixes).
- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).
- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).
- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).
- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).
- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).
- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).
- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).
- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).
- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).
- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).
- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).
- selftests/sgx: Treat CC as one argument (git-fixes).
- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).
- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).
- selftests/x86: Add validity check and allow field splitting (git-fixes).
- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).
- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).
- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).
- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).
- selftests: Fix IPv6 address bind tests (git-fixes).
- selftests: Fix raw socket bind tests with VRF (git-fixes).
- selftests: add ping test with ping_group_range tuned (git-fixes).
- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).
- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).
- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).
- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).
- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).
- selftests: forwarding: fix error message in learning_test (git-fixes).
- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).
- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- selftests: gpio: fix gpio compiling error (git-fixes).
- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).
- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).
- selftests: kvm: set rax before vmcall (git-fixes).
- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).
- selftests: mlxsw: resource_scale: Fix return value (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).
- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).
- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).
- selftests: mptcp: fix diag instability (git-fixes).
- selftests: mptcp: fix ipv6 routing setup (git-fixes).
- selftests: mptcp: more stable diag tests (git-fixes).
- selftests: net: Correct case name (git-fixes).
- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).
- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).
- selftests: net: tls: remove unused variable and code (git-fixes).
- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).
- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).
- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).
- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).
- selftests: netfilter: disable rp_filter on router (git-fixes).
- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).
- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).
- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).
- selftests: openat2: Add missing dependency in Makefile (git-fixes).
- selftests: openat2: Print also errno in failure messages (git-fixes).
- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).
- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).
- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).
- selftests: rtc: Increase test timeout so that all tests run (git-fixes).
- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).
- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).
- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).
- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).
- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).
- selftests: vm: fix clang build error multiple output files (git-fixes).
- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).
- selinux: Add boundary check in put_entry() (git-fixes).
- selinux: access superblock_security_struct in LSM blob way (git-fixes).
- selinux: check return value of sel_make_avc_files (git-fixes).
- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).
- selinux: fix double free of cond_list on error paths (git-fixes).
- selinux: fix memleak in security_read_state_kernel() (git-fixes).
- selinux: fix misuse of mutex_is_locked() (git-fixes).
- selinux: use correct type for context length (git-fixes).
- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).
- serial: 8250: Export ICR access helpers for internal use (git-fixes).
- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).
- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).
- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).
- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).
- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).
- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).
- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).
- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).
- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).
- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- soundwire: qcom: Check device status before reading devid (git-fixes).
- soundwire: qcom: fix device status array range (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: Fix simplification of devm_spi_register_controller (git-fixes).
- spi: dt-bindings: cadence: add missing 'required' (git-fixes).
- spi: dt-bindings: zynqmp-qspi: add missing 'required' (git-fixes).
- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).
- spi: spi-altera-dfl: Fix an error handling path (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- tee: optee: do not check memref size on return from Secure World (git-fixes).
- tee: tee_get_drvdata(): fix description of return value (git-fixes).
- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).
- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).
- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).
- tests: fix idmapped mount_setattr test (git-fixes).
- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).
- tools/nolibc: fix incorrect truncation of exit code (git-fixes).
- tools/nolibc: i386: fix initial stack alignment (git-fixes).
- tools/nolibc: x86-64: Fix startup code bug (git-fixes).
- tools/testing/scatterlist: add missing defines (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).
- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).
- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).
- tracing: Have filter accept 'common_cpu' to be consistent (git-fixes).
- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).
- tty: 8250: Add support for Brainboxes PX cards (git-fixes).
- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).
- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).
- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).
- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).
- tty: n_gsm: Modify cr bit value when config requester (git-fixes).
- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).
- tty: n_gsm: Save dlci address open status when config requester (git-fixes).
- tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() (git-fixes).
- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).
- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).
- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).
- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).
- tty: n_gsm: fix DM command (git-fixes).
- tty: n_gsm: fix broken virtual tty handling (git-fixes).
- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).
- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).
- tty: n_gsm: fix decoupled mux resource (git-fixes).
- tty: n_gsm: fix encoding of command/response bit (git-fixes).
- tty: n_gsm: fix flow control handling in tx path (git-fixes).
- tty: n_gsm: fix frame reception handling (git-fixes).
- tty: n_gsm: fix incorrect UA handling (git-fixes).
- tty: n_gsm: fix insufficient txframe size (git-fixes).
- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).
- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).
- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).
- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).
- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).
- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).
- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).
- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).
- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).
- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).
- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).
- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).
- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).
- tty: n_gsm: fix reset fifo race condition (git-fixes).
- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).
- tty: n_gsm: fix restart handling via CLD command (git-fixes).
- tty: n_gsm: fix software flow control handling (git-fixes).
- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).
- tty: n_gsm: fix tty registration before control channel open (git-fixes).
- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).
- tty: n_gsm: fix wrong DLCI release order (git-fixes).
- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).
- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).
- tty: n_gsm: fix wrong command retry handling (git-fixes).
- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).
- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).
- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).
- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- tun: avoid double free in tun_free_netdev (git-fixes).
- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).
- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).
- uaccess: fix type mismatch warnings from access_ok() (git-fixes).
- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).
- ucounts: Fix rlimit max values check (git-fixes).
- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).
- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).
- ucounts: In set_cred_ucounts assume new->ucounts is non-NULL (git-fixes).
- udf: Fix crash after seekdir (bsc#1194592).
- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).
- udmabuf: add back sanity check (git-fixes).
- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).
- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).
- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).
- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).
- usb: cdns3: fix random warning message when driver load (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).
- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).
- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).
- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).
- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).
- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).
- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).
- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).
- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).
- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).
- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- usb: xhci: tegra: Fix error check (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: Run unregister_netdev() before unbind() again (git-fixes).
- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).
- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).
- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).
- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- vfio: Clear the caps->buf to NULL after free (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).
- vsock/virtio: enable VQs early on probe (git-fixes).
- vsock/virtio: initialize vdev->priv before using VQs (git-fixes).
- vsock/virtio: read the negotiated features before using VQs (git-fixes).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).
- watch-queue: remove spurious double semicolon (git-fixes).
- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).
- watch_queue: Fix missing rcu annotation (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).
- watchqueue: make sure to serialize 'wqueue->defunct' properly (git-fixes).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).
- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).
- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).
- wireless: Remove redundant 'flush_workqueue()' calls (bsc#1202131).
- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).
- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).
- x86/sev: Save the negotiated GHCB version (bsc#1190497).
- xen/gntdev: fix unmap notification order (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xen: detect uninitialized xenbus in xenbus_init (git-fixes).
- xen: do not continue xenstore initialization in case of errors (git-fixes).
- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).
- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).
- xfs: fix use-after-free in xattr node block inactivation (git-fixes).
- xfs: fold perag loop iteration logic into helper function (git-fixes).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: only bother with sync_filesystem during readonly remount (git-fixes).
- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).
- xfs: rename the next_agno perag iteration variable (git-fixes).
- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).
- xfs: revert 'xfs: actually bump warning counts when we send warnings' (git-fixes).
- xfs: terminate perag iteration reliably on agcount (git-fixes).
- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xfs: use setattr_copy to set vfs inode attributes (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).
- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).
- xhci: dbc: refactor xhci_dbc_init() (git-fixes).
- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).
- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).
- zonefs: Clear inode information flags on inode creation (git-fixes).
- zonefs: Fix management of open zones (git-fixes).
- zonefs: add MODULE_ALIAS_FS (git-fixes).
Patchnames
SUSE-2022-3293,SUSE-SLE-Module-Basesystem-15-SP4-2022-3293,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3293,SUSE-SLE-Module-Legacy-15-SP4-2022-3293,SUSE-SLE-Module-Live-Patching-15-SP4-2022-3293,SUSE-SLE-Product-HA-15-SP4-2022-3293,SUSE-SLE-Product-WE-15-SP4-2022-3293,openSUSE-SLE-15.4-2022-3293
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bnc#1203041).\n- CVE-2022-28356: Fixed a refcount leak bug that was found in net/llc/af_llc.c (bnc#1197391).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bnc#1202623).\n- CVE-2022-28693: Fixed x86/speculation behavior by disabling RRSBA (bsc#1201455).\n- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1199515).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bnc#1202681 bnc#1202685).\n- CVE-2022-36946: Fixed a denial of service (panic) inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bnc#1201940 bnc#1201941 bnc#1202312 bnc#1202874).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bnc#1198702).\n- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bnc#1202558).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).\n- CVE-2022-32250: Fixed a privilege escalation issue in net/netfilter/nf_tables_api.c that allowed a local user to became root (bnc#1200015).\n\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: VIOT: Fix ACS setup (git-fixes).\n- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: thermal: drop an always true check (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).\n- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).\n- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Add endianness annotations (git-fixes).\n- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).\n- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).\n- ALSA: usb-audio: Turn off 'manual mode' on Dell dock (git-fixes).\n- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).\n- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).\n- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).\n- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).\n- ARM: dts: ast2500-evb: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb: fix board compatible (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).\n- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).\n- ARM: dts: imx6ul: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).\n- ARM: dts: imx6ul: fix csi node compatible (git-fixes).\n- ARM: dts: imx6ul: fix keypad compatible (git-fixes).\n- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).\n- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).\n- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).\n- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).\n- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).\n- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).\n- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).\n- ARM: findbit: fix overflowing offset (git-fixes).\n- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).\n- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).\n- ASoC: imx-audmux: Silence a clang warning (git-fixes).\n- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).\n- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).\n- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).\n- ASoC: mt6359: Fix refcount leak bug (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).\n- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).\n- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).\n- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).\n- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).\n- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).\n- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).\n- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).\n- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).\n- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).\n- Bluetooth: SCO: Fix sco_send_frame returning skb->len (git-fixes).\n- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).\n- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).\n- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).\n- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).\n- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).\n- HID: add Lenovo Yoga C630 battery quirk (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: amd_sfh: Add NULL check for hid device (git-fixes).\n- HID: amd_sfh: Handle condition of 'no sensors' (git-fixes).\n- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: hid-input: add Surface Go battery quirk (git-fixes).\n- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).\n- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).\n- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).\n- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).\n- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - merge quirk tables (git-fies).\n- Input: i8042 - move __initconst to fix code styling warning (git-fies).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- KABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).\n- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).\n- KVM: MMU: shadow nested paging does not have PKU (git-fixes).\n- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).\n- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).\n- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).\n- KVM: SVM: Unwind 'speculative' RIP advancement if INTn injection 'fails' (git-fixes).\n- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).\n- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).\n- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).\n- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).\n- KVM: X86: Use vcpu->arch.walk_mmu for kvm_mmu_invlpg() (git-fixes).\n- KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).\n- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).\n- KVM: nVMX: do not use vcpu->arch.efer when checking host state on nested state load (git-fixes).\n- KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE (git-fixes).\n- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).\n- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).\n- KVM: x86/mmu: Move 'invalid' check out of kvm_tdp_mmu_get_root() (git-fixes).\n- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).\n- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).\n- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).\n- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).\n- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).\n- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).\n- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb() (git-fixes).\n- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).\n- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).\n- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (git-fixes).\n- NFSD: Fix ia_size underflow (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/AER: Iterate over error counters instead of error strings (git-fixes).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).\n- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).\n- SUNRPC: Fix NFSD's request deferral on RDMA transports (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- XArray: Update the LRU list in xas_split() (git-fixes).\n- apparmor: Fix failed mount permission check error message (git-fixes).\n- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).\n- apparmor: fix aa_label_asxprint return check (git-fixes).\n- apparmor: fix absroot causing audited secids to begin with = (git-fixes).\n- apparmor: fix overlapping attachment computation (git-fixes).\n- apparmor: fix quiet_denied for file rules (git-fixes).\n- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).\n- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).\n- arm64: Do not forget syscall when starting a new thread (git-fixes).\n- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).\n- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).\n- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).\n- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).\n- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).\n- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).\n- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).\n- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).\n- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).\n- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).\n- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).\n- arm64: fix rodata=full (git-fixes).\n- arm64: kasan: Revert 'arm64: mte: reset the page tag in page->flags' (git-fixes).\n- arm64: set UXN on swapper page tables (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).\n- arm64: tegra: Fixup SYSRAM references (git-fixes).\n- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).\n- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).\n- arm_pmu: Validate single/group leader events (git-fixes).\n- asm-generic: remove a broken and needless ifdef conditional (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath11k: Fix incorrect debug_mask mappings (git-fixes).\n- ath11k: fix netdev open race (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).\n- ax25: Fix ax25 session cleanup problems (git-fixes).\n- bitfield.h: Fix 'type of reg too small for mask' test (git-fixes).\n- block: Fix fsync always failed if once failed (bsc#1202779).\n- block: Fix wrong offset in bio_truncate() (bsc#1202780).\n- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).\n- block: only mark bio as tracked if it really is tracked (bsc#1202782).\n- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).\n- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).\n- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: mcp251x: Fix race condition on receive interrupt (git-fixes).\n- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).\n- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).\n- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).\n- ceph: do not truncate file in atomic_open (bsc#1202824).\n- ceph: use correct index when encoding client supported features (bsc#1202822).\n- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- cifs: fix reconnect on smb3 mount types (bsc#1201427).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: mediatek: reset: Fix written reset bit offset (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver's init level (git-fixes).\n- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).\n- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).\n- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).\n- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).\n- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).\n- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).\n- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).\n- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).\n- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).\n- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).\n- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/sec - fix auth key size error (git-fixes).\n- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).\n- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).\n- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).\n- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).\n- device property: Check fwnode->secondary when finding properties (git-fixes).\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).\n- dma-debug: make things less spammy under memory pressure (git-fixes).\n- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).\n- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).\n- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).\n- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).\n- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).\n- docs/kernel-parameters: Update descriptions for 'mitigations=' param with retbleed (git-fixes).\n- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).\n- docs: zh_CN: fix a broken reference (git-fixes).\n- dpaa2-eth: fix ethtool statistics (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drivers/iio: Remove all strcpy() uses (git-fixes).\n- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).\n- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).\n- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).\n- drm/amd/display: Avoid MPC infinite loop (git-fixes).\n- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).\n- drm/amd/display: Fix pixel clock programming (git-fixes).\n- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).\n- drm/amd/display: For stereo keep 'FLIP_ANY_FRAME' (git-fixes).\n- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).\n- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).\n- drm/amd/display: Reset DMCUB before HW init (git-fixes).\n- drm/amd/display: Revert 'drm/amd/display: turn DPMS off on connector unplug' (git-fixes).\n- drm/amd/display: avoid doing vm_init multiple time (git-fixes).\n- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).\n- drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid (git-fixes).\n- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).\n- drm/amdgpu: Remove one duplicated ef removal (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/bridge: lt9611uxc: Cancel only driver's work (git-fixes).\n- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).\n- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).\n- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).\n- drm/i915: fix null pointer dereference (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: Allow commands to be sent during video mode (git-fixes).\n- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).\n- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).\n- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).\n- drm/msm/dpu: Fix for non-visible planes (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: drop empty 'none' regulator lists (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).\n- drm/msm: Fix dirtyfb refcounting (git-fixes).\n- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).\n- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).\n- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/nouveau: recognise GA103 (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/shmem-helper: Add missing vunmap on error (git-fixes).\n- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).\n- drm/udl: Add parameter to set number of URBs (bsc#1195917).\n- drm/udl: Add reset_resume (bsc#1195917)\n- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).\n- drm/udl: Drop unneeded alignment (bsc#1195917).\n- drm/udl: Enable damage clipping (bsc#1195917).\n- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).\n- drm/udl: Fix potential URB leaks (bsc#1195917).\n- drm/udl: Increase the default URB list size to 20 (bsc#1195917).\n- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).\n- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).\n- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).\n- drm/udl: Restore display mode on resume (bsc#1195917)\n- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).\n- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).\n- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).\n- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).\n- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).\n- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).\n- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).\n- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).\n- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).\n- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).\n- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).\n- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).\n- erofs: fix deadlock when shrink erofs slab (git-fixes).\n- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).\n- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).\n- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).\n- exfat: Drop superfluous new line for error messages (bsc#1201725).\n- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).\n- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix referencing wrong parent directory information after renaming (git-fixes).\n- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).\n- exfat: use updated exfat_chain directly during renaming (git-fixes).\n- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).\n- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).\n- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769).\n- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).\n- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).\n- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).\n- ext4: fix null-ptr-deref in '__ext4_journal_ensure_credits' (bsc#1202764).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix super block checksum incorrect after mount (bsc#1202773).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).\n- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).\n- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).\n- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).\n- fat: add ratelimit to fat*_ent_bread() (git-fixes).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).\n- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).\n- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).\n- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fix race between exit_itimers() and /proc/pid/timers (git-fixes).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).\n- ftrace/x86: Add back ftrace_expected assignment (git-fixes).\n- fuse: ioctl: translate ENOSYS (bsc#1203139).\n- fuse: limit nsec (bsc#1203138).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- habanalabs/gaudi: fix shift out of bounds (git-fixes).\n- habanalabs/gaudi: mask constant value before cast (git-fixes).\n- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).\n- hwmon: (drivetemp) Add module alias (git-fixes).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- i2c: mxs: Silence a clang warning (git-fixes).\n- i2c: npcm: Capitalize the one-line comment (git-fixes).\n- i2c: npcm: Correct slave role behavior (git-fixes).\n- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).\n- ice: fix 'scheduling while atomic' on aux critical err interrupt (git-fixes).\n- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).\n- ieee80211: change HE nominal packet padding value defines (bsc#1202131).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).\n- iio: accel: bma400: Reordering of header files (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).\n- iio: ad7292: Prevent regulator double disable (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: common: ssp: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).\n- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).\n- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- interconnect: imx: fix max_node_id (git-fixes).\n- io_uring: add a schedule point in io_add_buffers() (git-fixes).\n- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).\n- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).\n- iommu/amd: Enable swiotlb in all cases (git-fixes).\n- iommu/amd: Fix I/O page table memory leak (git-fixes).\n- iommu/amd: Recover from event log overflow (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).\n- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/dart: Add missing module owner to ops structure (git-fixes).\n- iommu/dart: check return value after calling platform_get_resource() (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).\n- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).\n- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).\n- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).\n- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Drop stop marker messages (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).\n- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).\n- iommu/vt-d: Remove global g_iommus array (bsc#1200301).\n- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).\n- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).\n- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu: Fix potential use-after-free during probe (git-fixes).\n- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).\n- iov_iter: fix build issue due to possible type mis-match (git-fixes).\n- ipmi: fix initialization when workqueue allocation fails (git-fixes).\n- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).\n- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).\n- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).\n- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).\n- iwlwifi: Add support for more BZ HWs (bsc#1202131).\n- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).\n- iwlwifi: BZ Family SW reset support (bsc#1202131).\n- iwlwifi: Configure FW debug preset via module param (bsc#1202131).\n- iwlwifi: Fix FW name for gl (bsc#1202131).\n- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).\n- iwlwifi: Fix syntax errors in comments (bsc#1202131).\n- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).\n- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).\n- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).\n- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).\n- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).\n- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).\n- iwlwifi: add new Qu-Hr device (bsc#1202131).\n- iwlwifi: add new ax1650 killer device (bsc#1202131).\n- iwlwifi: add new device id 7F70 (bsc#1202131).\n- iwlwifi: add new pci SoF with JF (bsc#1202131).\n- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).\n- iwlwifi: add support for BNJ HW (bsc#1202131).\n- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).\n- iwlwifi: add support for Bz-Z HW (bsc#1202131).\n- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).\n- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).\n- iwlwifi: allow rate-limited error messages (bsc#1202131).\n- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).\n- iwlwifi: api: remove ttl field from TX command (bsc#1202131).\n- iwlwifi: api: remove unused RX status bits (bsc#1202131).\n- iwlwifi: avoid variable shadowing (bsc#1202131).\n- iwlwifi: avoid void pointer arithmetic (bsc#1202131).\n- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).\n- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).\n- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).\n- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).\n- iwlwifi: dbg: check trigger data before access (bsc#1202131).\n- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).\n- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).\n- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).\n- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).\n- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).\n- iwlwifi: de-const properly where needed (bsc#1202131).\n- iwlwifi: debugfs: remove useless double condition (bsc#1202131).\n- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).\n- iwlwifi: do not use __unused as variable name (bsc#1202131).\n- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).\n- iwlwifi: dump CSR scratch from outer function (bsc#1202131).\n- iwlwifi: dump RCM error tables (bsc#1202131).\n- iwlwifi: dump both TCM error tables if present (bsc#1202131).\n- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).\n- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: eeprom: clean up macros (bsc#1202131).\n- iwlwifi: fix LED dependencies (bsc#1202131).\n- iwlwifi: fix debug TLV parsing (bsc#1202131).\n- iwlwifi: fix fw/img.c license statement (bsc#1202131).\n- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).\n- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).\n- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).\n- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).\n- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).\n- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).\n- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).\n- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).\n- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).\n- iwlwifi: fw: make dump_start callback void (bsc#1202131).\n- iwlwifi: fw: remove dead error log code (bsc#1202131).\n- iwlwifi: implement reset flow for Bz devices (bsc#1202131).\n- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).\n- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).\n- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).\n- iwlwifi: make some functions friendly to sparse (bsc#1202131).\n- iwlwifi: move symbols into a separate namespace (bsc#1202131).\n- iwlwifi: mvm/api: define system control command (bsc#1202131).\n- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).\n- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).\n- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).\n- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).\n- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).\n- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).\n- iwlwifi: mvm: Do not fail if PPAG isn't supported (bsc#1202131).\n- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).\n- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).\n- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).\n- iwlwifi: mvm: Remove antenna c references (bsc#1202131).\n- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).\n- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).\n- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).\n- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).\n- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).\n- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).\n- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).\n- iwlwifi: mvm: add US/CA to TAS block list if OEM isn't allowed (bsc#1202131).\n- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).\n- iwlwifi: mvm: add definitions for new rate & flags (bsc#1202131).\n- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).\n- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).\n- iwlwifi: mvm: add some missing command strings (bsc#1202131).\n- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).\n- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).\n- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).\n- iwlwifi: mvm: add support for OCE scan (bsc#1202131).\n- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).\n- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).\n- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).\n- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).\n- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).\n- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).\n- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).\n- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).\n- iwlwifi: mvm: convert old rate & flags to the new format (bsc#1202131).\n- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).\n- iwlwifi: mvm: correctly set channel flags (bsc#1202131).\n- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).\n- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).\n- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).\n- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).\n- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).\n- iwlwifi: mvm: do not get address of mvm->fwrt just to dereference as a pointer (bsc#1202131).\n- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).\n- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).\n- iwlwifi: mvm: drop too short packets silently (bsc#1202131).\n- iwlwifi: mvm: extend session protection on association (bsc#1202131).\n- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).\n- iwlwifi: mvm: fix a stray tab (bsc#1202131).\n- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).\n- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).\n- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).\n- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).\n- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).\n- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).\n- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).\n- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).\n- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).\n- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).\n- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).\n- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).\n- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).\n- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).\n- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).\n- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).\n- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).\n- iwlwifi: mvm: remove card state notification code (bsc#1202131).\n- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).\n- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).\n- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).\n- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).\n- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).\n- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).\n- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).\n- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).\n- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).\n- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).\n- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).\n- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).\n- iwlwifi: mvm: support RLC configuration command (bsc#1202131).\n- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).\n- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).\n- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).\n- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).\n- iwlwifi: mvm: update RFI TLV (bsc#1202131).\n- iwlwifi: mvm: update definitions due to new rate & flags (bsc#1202131).\n- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).\n- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).\n- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).\n- iwlwifi: nvm: Correct HE capability (bsc#1202131).\n- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).\n- iwlwifi: parse error tables from debug TLVs (bsc#1202131).\n- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).\n- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).\n- iwlwifi: pcie: add support for MS devices (bsc#1202131).\n- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).\n- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).\n- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).\n- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).\n- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).\n- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).\n- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).\n- iwlwifi: pcie: remove duplicate entry (bsc#1202131).\n- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).\n- iwlwifi: pcie: retake ownership after reset (bsc#1202131).\n- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).\n- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).\n- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).\n- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).\n- iwlwifi: pnvm: print out the version properly (bsc#1202131).\n- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).\n- iwlwifi: propagate (const) type qualifier (bsc#1202131).\n- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).\n- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).\n- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).\n- iwlwifi: remove contact information (bsc#1202131).\n- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).\n- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).\n- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).\n- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).\n- iwlwifi: remove unused macros (bsc#1202131).\n- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).\n- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).\n- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).\n- iwlwifi: scan: Modify return value of a function (bsc#1202131).\n- iwlwifi: support 4-bits in MAC step value (bsc#1202131).\n- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).\n- iwlwifi: support new queue allocation command (bsc#1202131).\n- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).\n- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).\n- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).\n- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).\n- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).\n- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).\n- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).\n- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).\n- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).\n- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).\n- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).\n- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).\n- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).\n- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).\n- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).\n- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).\n- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).\n- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).\n- kabi/severities: Exclude ppc kvm\n- kabi/severities: add Qlogic qed symbols\n- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471\n- kabi/severities: add hisilicon hns3 symbols\n- kabi/severities: add microchip dsa drivers\n- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.\n- kabi/severities: octeontx2 driver (jsc#SLE-24682)\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kbuild: fix the modules order between drivers and libs (git-fixes).\n- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).\n- kcm: fix strp_init() order and cleanup (git-fies).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).\n- kselftest/vm: fix tests build with old libc (git-fixes).\n- kselftest: Fix vdso_test_abi return status (git-fixes).\n- kselftest: signal all child processes (git-fixes).\n- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).\n- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).\n- landlock: Add clang-format exceptions (git-fixes).\n- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).\n- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).\n- landlock: Create find_rule() from unmask_layers() (git-fixes).\n- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).\n- landlock: Fix landlock_add_rule(2) documentation (git-fixes).\n- landlock: Fix same-layer rule unions (git-fixes).\n- landlock: Format with clang-format (git-fixes).\n- landlock: Reduce the maximum number of layers to 16 (git-fixes).\n- landlock: Use square brackets around 'landlock-ruleset' (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib/raid6/test: fix multiple definition linking error (git-fixes).\n- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).\n- lkdtm: Disable return thunks in rodata.c (bsc#1190497).\n- lockdep: Correct lock_classes index mapping (git-fixes).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).\n- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).\n- loop: Check for overflow while configuring loop (git-fies).\n- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).\n- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).\n- mac80211: fix a memory leak where sta_info is not freed (git-fixes).\n- mac80211: introduce channel switch disconnect function (bsc#1202131).\n- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).\n- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).\n- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).\n- macsec: limit replay window size with XPN (git-fixes).\n- marvell: octeontx2: build error: unknown type name 'u64' (jsc#SLE-24682).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).\n- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).\n- media: cedrus: h265: Fix flag name (git-fixes).\n- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).\n- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).\n- media: hantro: postproc: Fix motion vector space size (git-fixes).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: hevc: Embedded indexes in RPS (git-fixes).\n- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).\n- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).\n- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).\n- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).\n- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- minix: fix bug when opening a file with O_DIRECT (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mmc: block: Add single read for 4k sector cards (git-fixes).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).\n- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).\n- mmc: mxcmmc: Silence a clang warning (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- mmc: tmio: avoid glitches when resetting (git-fixes).\n- msft-hv-2570-hv_netvsc: Add support for XDP_REDIRECT (bsc#1199364).\n- mt76: mt7615: do not update pm stats in case of error (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).\n- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).\n- mtd: dataflash: Add SPI ID table (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).\n- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).\n- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).\n- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).\n- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).\n- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).\n- n_gsm: remove unused parameters from gsm_error() (git-fixes).\n- net: asix: fix 'can't send until first packet is send' issue (git-fixes).\n- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).\n- net: dsa: b53: Add SPI ID table (git-fixes).\n- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).\n- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).\n- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).\n- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).\n- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).\n- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).\n- net: dsa: microchip: implement multi-bridge support (git-fixes).\n- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).\n- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).\n- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).\n- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).\n- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).\n- net: dsa: mv88e6xxx: Unforce speed & duplex in mac_link_down() (git-fixes).\n- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).\n- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).\n- net: dsa: mv88e6xxx: fix 'do not use PHY_DETECT on internal PHY's' (git-fixes).\n- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).\n- net: dsa: qca8k: fix MTU calculation (git-fixes).\n- net: dsa: seville: register the mdiobus under devres (git-fixes).\n- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: hns3: clean residual vf config after disable sriov (git-fixes).\n- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).\n- net: marvell: prestera: fix incorrect structure access (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).\n- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).\n- net: mscc: ocelot: set up traps for PTP packets (git-fixes).\n- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).\n- net: openvswitch: fix leak of nested actions (git-fixes).\n- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).\n- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).\n- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).\n- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).\n- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmmac: clean up impossible condition (git-fixes).\n- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).\n- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).\n- net: stmmac: fix off-by-one error in sanity check (git-fixes).\n- net: usb: Correct PHY handling of smsc95xx (git-fixes).\n- net: usb: Correct reset handling of smsc95xx (git-fixes).\n- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).\n- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).\n- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).\n- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).\n- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).\n- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).\n- nouveau/svm: Fix to migrate all requested pages (git-fixes).\n- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).\n- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).\n- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).\n- nvme-auth: retry command if DNR bit is not set (bsc#1201675).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: consider also host_iface when checking ip options (bsc#1199670).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvme: implement In-Band authentication (jsc#SLE-20183).\n- nvme: kabi fixes for in-band authentication (bsc#1199086).\n- nvmet-auth: expire authentication sessions (jsc#SLE-20183).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).\n- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).\n- ocfs2: fix a deadlock when commit trans (bsc#1202776).\n- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).\n- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).\n- octeontx2-af: Add SDP interface support (jsc#SLE-24682).\n- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).\n- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).\n- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).\n- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).\n- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).\n- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).\n- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).\n- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).\n- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).\n- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).\n- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).\n- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).\n- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).\n- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).\n- octeontx2-af: Fix spelling mistake 'Makesure' -> 'Make sure' (jsc#SLE-24682).\n- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).\n- octeontx2-af: Flow control resource management (jsc#SLE-24682).\n- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).\n- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).\n- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).\n- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).\n- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).\n- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).\n- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).\n- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).\n- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).\n- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).\n- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).\n- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).\n- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).\n- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).\n- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).\n- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).\n- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).\n- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).\n- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).\n- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).\n- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).\n- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).\n- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).\n- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).\n- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).\n- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).\n- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).\n- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).\n- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).\n- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).\n- octeontx2-af: fix array bound error (jsc#SLE-24682).\n- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).\n- octeontx2-af: initialize action variable (jsc#SLE-24682).\n- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).\n- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).\n- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).\n- octeontx2-af: verify CQ context updates (jsc#SLE-24682).\n- octeontx2-nic: fix mixed module build (jsc#SLE-24682).\n- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).\n- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).\n- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).\n- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).\n- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).\n- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).\n- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).\n- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).\n- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).\n- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).\n- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).\n- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).\n- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).\n- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).\n- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).\n- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).\n- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).\n- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).\n- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).\n- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).\n- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).\n- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).\n- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).\n- openvswitch: always update flow key after nat (git-fixes).\n- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).\n- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).\n- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).\n- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).\n- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).\n- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).\n- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).\n- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).\n- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- platform/chrome: cros_ec: Always expose last resume result (git-fixes).\n- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- proc: fix a dentry lock race between release_task and lookup (git-fixes).\n- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).\n- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).\n- pwm: lpc18xx: Fix period handling (git-fixes).\n- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).\n- r8152: fix the RX FIFO settings when suspending (git-fixes).\n- r8152: fix the units of some registers for RTL8156A (git-fixes).\n- random: remove useless header comment (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).\n- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).\n- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).\n- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).\n- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).\n- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).\n- rose: check NULL rose_loopback_neigh->loopback (git-fixes).\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) \n- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).\n- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).\n- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).\n- s390/cpumf: Handle events cycles and instructions identical (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).\n- s390/hypfs: avoid error message under KVM (bsc#1032323).\n- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).\n- s390/stp: clock_delta should be signed (git-fixes).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- samples/landlock: Add clang-format exceptions (git-fixes).\n- samples/landlock: Fix path_list memory leak (git-fixes).\n- samples/landlock: Format with clang-format (git-fixes).\n- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).\n- sched/fair: Remove redundant word ' *' (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)\n- sched/uclamp: Fix rq->uclamp_max not set on first enqueue (git-fixes)\n- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh\n- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).\n- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).\n- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).\n- scripts/gdb: change kernel config dumping method (git-fixes).\n- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).\n- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).\n- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).\n- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).\n- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).\n- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).\n- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).\n- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).\n- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).\n- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: megaraid: Clear READ queue map's nr_queues (git-fixes).\n- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).\n- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).\n- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).\n- scsi: qla2xxx: Fix imbalance vha->vref_count (bsc#1201958).\n- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).\n- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).\n- scsi: qla2xxx: Update manufacturer details (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).\n- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).\n- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: ufs: core: Fix another task management completion race (git-fixes).\n- scsi: ufs: core: Fix task management completion timeout race (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).\n- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).\n- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).\n- selftest/vm: verify mmap addr in mremap_test (git-fixes).\n- selftest/vm: verify remap destination address in mremap_test (git-fixes).\n- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).\n- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).\n- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).\n- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).\n- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).\n- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).\n- selftests/landlock: Add clang-format exceptions (git-fixes).\n- selftests/landlock: Add tests for O_PATH (git-fixes).\n- selftests/landlock: Add tests for unknown access rights (git-fixes).\n- selftests/landlock: Extend access right tests to directories (git-fixes).\n- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).\n- selftests/landlock: Format with clang-format (git-fixes).\n- selftests/landlock: Fully test file rename with 'remove' access (git-fixes).\n- selftests/landlock: Make tests build with old libc (git-fixes).\n- selftests/landlock: Normalize array assignment (git-fixes).\n- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).\n- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).\n- selftests/memfd: remove unused variable (git-fixes).\n- selftests/net: pass ipv6_args to udpgso_bench's IPv6 TCP test (git-fixes).\n- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).\n- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).\n- selftests/net: timestamping: Fix bind_phc check (git-fixes).\n- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).\n- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).\n- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).\n- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).\n- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).\n- selftests/rseq: Fix ppc32 missing instruction selection 'u' and 'x' for load/store (git-fixes).\n- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).\n- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).\n- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).\n- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).\n- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).\n- selftests/rseq: Introduce thread pointer getters (git-fixes).\n- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).\n- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).\n- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).\n- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).\n- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).\n- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).\n- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).\n- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).\n- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).\n- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).\n- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).\n- selftests/sgx: Treat CC as one argument (git-fixes).\n- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).\n- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).\n- selftests/x86: Add validity check and allow field splitting (git-fixes).\n- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).\n- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).\n- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).\n- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).\n- selftests: Fix IPv6 address bind tests (git-fixes).\n- selftests: Fix raw socket bind tests with VRF (git-fixes).\n- selftests: add ping test with ping_group_range tuned (git-fixes).\n- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).\n- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).\n- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).\n- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).\n- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).\n- selftests: forwarding: fix error message in learning_test (git-fixes).\n- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- selftests: gpio: fix gpio compiling error (git-fixes).\n- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).\n- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).\n- selftests: kvm: set rax before vmcall (git-fixes).\n- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).\n- selftests: mlxsw: resource_scale: Fix return value (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).\n- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).\n- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).\n- selftests: mptcp: fix diag instability (git-fixes).\n- selftests: mptcp: fix ipv6 routing setup (git-fixes).\n- selftests: mptcp: more stable diag tests (git-fixes).\n- selftests: net: Correct case name (git-fixes).\n- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).\n- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).\n- selftests: net: tls: remove unused variable and code (git-fixes).\n- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).\n- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).\n- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).\n- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).\n- selftests: netfilter: disable rp_filter on router (git-fixes).\n- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).\n- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).\n- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).\n- selftests: openat2: Add missing dependency in Makefile (git-fixes).\n- selftests: openat2: Print also errno in failure messages (git-fixes).\n- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).\n- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).\n- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).\n- selftests: rtc: Increase test timeout so that all tests run (git-fixes).\n- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).\n- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).\n- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).\n- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).\n- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).\n- selftests: vm: fix clang build error multiple output files (git-fixes).\n- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).\n- selinux: Add boundary check in put_entry() (git-fixes).\n- selinux: access superblock_security_struct in LSM blob way (git-fixes).\n- selinux: check return value of sel_make_avc_files (git-fixes).\n- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).\n- selinux: fix double free of cond_list on error paths (git-fixes).\n- selinux: fix memleak in security_read_state_kernel() (git-fixes).\n- selinux: fix misuse of mutex_is_locked() (git-fixes).\n- selinux: use correct type for context length (git-fixes).\n- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).\n- serial: 8250: Export ICR access helpers for internal use (git-fixes).\n- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).\n- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).\n- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).\n- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).\n- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).\n- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).\n- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).\n- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).\n- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).\n- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- soundwire: qcom: Check device status before reading devid (git-fixes).\n- soundwire: qcom: fix device status array range (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: Fix simplification of devm_spi_register_controller (git-fixes).\n- spi: dt-bindings: cadence: add missing 'required' (git-fixes).\n- spi: dt-bindings: zynqmp-qspi: add missing 'required' (git-fixes).\n- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).\n- spi: spi-altera-dfl: Fix an error handling path (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- tee: optee: do not check memref size on return from Secure World (git-fixes).\n- tee: tee_get_drvdata(): fix description of return value (git-fixes).\n- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).\n- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).\n- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).\n- tests: fix idmapped mount_setattr test (git-fixes).\n- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).\n- tools/nolibc: fix incorrect truncation of exit code (git-fixes).\n- tools/nolibc: i386: fix initial stack alignment (git-fixes).\n- tools/nolibc: x86-64: Fix startup code bug (git-fixes).\n- tools/testing/scatterlist: add missing defines (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).\n- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).\n- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).\n- tracing: Have filter accept 'common_cpu' to be consistent (git-fixes).\n- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).\n- tty: 8250: Add support for Brainboxes PX cards (git-fixes).\n- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).\n- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).\n- tty: n_gsm: Modify cr bit value when config requester (git-fixes).\n- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).\n- tty: n_gsm: Save dlci address open status when config requester (git-fixes).\n- tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() (git-fixes).\n- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).\n- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).\n- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).\n- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).\n- tty: n_gsm: fix DM command (git-fixes).\n- tty: n_gsm: fix broken virtual tty handling (git-fixes).\n- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).\n- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).\n- tty: n_gsm: fix decoupled mux resource (git-fixes).\n- tty: n_gsm: fix encoding of command/response bit (git-fixes).\n- tty: n_gsm: fix flow control handling in tx path (git-fixes).\n- tty: n_gsm: fix frame reception handling (git-fixes).\n- tty: n_gsm: fix incorrect UA handling (git-fixes).\n- tty: n_gsm: fix insufficient txframe size (git-fixes).\n- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).\n- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).\n- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).\n- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).\n- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).\n- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).\n- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).\n- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).\n- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).\n- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).\n- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).\n- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).\n- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).\n- tty: n_gsm: fix reset fifo race condition (git-fixes).\n- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).\n- tty: n_gsm: fix restart handling via CLD command (git-fixes).\n- tty: n_gsm: fix software flow control handling (git-fixes).\n- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).\n- tty: n_gsm: fix tty registration before control channel open (git-fixes).\n- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).\n- tty: n_gsm: fix wrong DLCI release order (git-fixes).\n- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).\n- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).\n- tty: n_gsm: fix wrong command retry handling (git-fixes).\n- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).\n- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).\n- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).\n- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- tun: avoid double free in tun_free_netdev (git-fixes).\n- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).\n- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).\n- uaccess: fix type mismatch warnings from access_ok() (git-fixes).\n- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).\n- ucounts: Fix rlimit max values check (git-fixes).\n- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).\n- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).\n- ucounts: In set_cred_ucounts assume new->ucounts is non-NULL (git-fixes).\n- udf: Fix crash after seekdir (bsc#1194592).\n- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).\n- udmabuf: add back sanity check (git-fixes).\n- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).\n- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).\n- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).\n- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).\n- usb: cdns3: fix random warning message when driver load (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).\n- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).\n- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).\n- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).\n- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).\n- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).\n- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).\n- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).\n- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).\n- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).\n- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- usb: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Run unregister_netdev() before unbind() again (git-fixes).\n- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).\n- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).\n- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).\n- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- vfio: Clear the caps->buf to NULL after free (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).\n- vsock/virtio: enable VQs early on probe (git-fixes).\n- vsock/virtio: initialize vdev->priv before using VQs (git-fixes).\n- vsock/virtio: read the negotiated features before using VQs (git-fixes).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).\n- watch-queue: remove spurious double semicolon (git-fixes).\n- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).\n- watch_queue: Fix missing rcu annotation (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).\n- watchqueue: make sure to serialize 'wqueue->defunct' properly (git-fixes).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).\n- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).\n- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).\n- wireless: Remove redundant 'flush_workqueue()' calls (bsc#1202131).\n- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).\n- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).\n- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).\n- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).\n- x86/sev: Save the negotiated GHCB version (bsc#1190497).\n- xen/gntdev: fix unmap notification order (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).\n- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).\n- xfs: fix use-after-free in xattr node block inactivation (git-fixes).\n- xfs: fold perag loop iteration logic into helper function (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: only bother with sync_filesystem during readonly remount (git-fixes).\n- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).\n- xfs: rename the next_agno perag iteration variable (git-fixes).\n- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).\n- xfs: revert 'xfs: actually bump warning counts when we send warnings' (git-fixes).\n- xfs: terminate perag iteration reliably on agcount (git-fixes).\n- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xfs: use setattr_copy to set vfs inode attributes (git-fixes).\n- xhci: Set HCD flag to defer primary roothub registration (git-fixes).\n- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).\n- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).\n- xhci: dbc: refactor xhci_dbc_init() (git-fixes).\n- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).\n- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).\n- zonefs: Clear inode information flags on inode creation (git-fixes).\n- zonefs: Fix management of open zones (git-fixes).\n- zonefs: add MODULE_ALIAS_FS (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-3293,SUSE-SLE-Module-Basesystem-15-SP4-2022-3293,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3293,SUSE-SLE-Module-Legacy-15-SP4-2022-3293,SUSE-SLE-Module-Live-Patching-15-SP4-2022-3293,SUSE-SLE-Product-HA-15-SP4-2022-3293,SUSE-SLE-Product-WE-15-SP4-2022-3293,openSUSE-SLE-15.4-2022-3293", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3293-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:3293-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20223293-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:3293-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html", }, { category: "self", summary: "SUSE Bug 1023051", url: "https://bugzilla.suse.com/1023051", }, { category: "self", summary: "SUSE Bug 1032323", url: "https://bugzilla.suse.com/1032323", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1190497", url: "https://bugzilla.suse.com/1190497", }, { category: "self", summary: "SUSE Bug 1194592", url: "https://bugzilla.suse.com/1194592", }, { category: "self", summary: "SUSE Bug 1194869", url: "https://bugzilla.suse.com/1194869", }, { category: "self", summary: "SUSE Bug 1194904", url: "https://bugzilla.suse.com/1194904", }, { category: "self", summary: "SUSE Bug 1195480", url: "https://bugzilla.suse.com/1195480", }, { category: "self", summary: "SUSE Bug 1195917", url: "https://bugzilla.suse.com/1195917", }, { category: "self", summary: "SUSE Bug 1196616", url: "https://bugzilla.suse.com/1196616", }, { category: "self", summary: "SUSE Bug 1197158", url: "https://bugzilla.suse.com/1197158", }, { category: "self", summary: "SUSE Bug 1197391", url: "https://bugzilla.suse.com/1197391", }, { category: "self", summary: "SUSE Bug 1197755", url: "https://bugzilla.suse.com/1197755", }, { category: "self", summary: "SUSE Bug 1197756", url: "https://bugzilla.suse.com/1197756", }, { category: "self", summary: "SUSE Bug 1197757", url: "https://bugzilla.suse.com/1197757", }, { category: "self", summary: "SUSE Bug 1197763", url: "https://bugzilla.suse.com/1197763", }, { category: "self", summary: "SUSE Bug 1198410", url: "https://bugzilla.suse.com/1198410", }, { category: "self", summary: "SUSE Bug 1198971", url: "https://bugzilla.suse.com/1198971", }, { category: "self", summary: "SUSE Bug 1199086", url: "https://bugzilla.suse.com/1199086", }, { category: "self", summary: "SUSE Bug 1199364", url: "https://bugzilla.suse.com/1199364", }, { category: "self", summary: "SUSE Bug 1199670", url: "https://bugzilla.suse.com/1199670", }, { category: "self", summary: "SUSE Bug 1200313", url: "https://bugzilla.suse.com/1200313", }, { category: "self", summary: "SUSE Bug 1200431", url: "https://bugzilla.suse.com/1200431", }, { category: "self", summary: "SUSE Bug 1200465", url: "https://bugzilla.suse.com/1200465", }, { category: "self", summary: "SUSE Bug 1200544", url: "https://bugzilla.suse.com/1200544", }, { category: "self", summary: "SUSE Bug 1200845", url: "https://bugzilla.suse.com/1200845", }, { category: "self", summary: "SUSE Bug 1200868", url: "https://bugzilla.suse.com/1200868", }, { category: "self", summary: "SUSE Bug 1200869", url: "https://bugzilla.suse.com/1200869", }, { category: "self", summary: "SUSE Bug 1200870", url: "https://bugzilla.suse.com/1200870", }, { category: "self", summary: "SUSE Bug 1200871", url: "https://bugzilla.suse.com/1200871", }, { category: "self", summary: "SUSE Bug 1200872", url: "https://bugzilla.suse.com/1200872", }, { category: "self", summary: "SUSE Bug 1200873", url: "https://bugzilla.suse.com/1200873", }, { category: "self", summary: "SUSE Bug 1201019", url: "https://bugzilla.suse.com/1201019", }, { category: "self", summary: "SUSE Bug 1201308", url: "https://bugzilla.suse.com/1201308", }, { category: "self", summary: "SUSE Bug 1201427", url: "https://bugzilla.suse.com/1201427", }, { category: "self", summary: "SUSE Bug 1201442", url: "https://bugzilla.suse.com/1201442", }, { category: "self", summary: "SUSE Bug 1201455", url: "https://bugzilla.suse.com/1201455", }, { category: "self", summary: "SUSE Bug 1201489", url: "https://bugzilla.suse.com/1201489", }, { category: "self", summary: "SUSE Bug 1201610", url: "https://bugzilla.suse.com/1201610", }, { category: "self", summary: "SUSE Bug 1201675", url: "https://bugzilla.suse.com/1201675", }, { category: "self", summary: "SUSE Bug 1201725", url: "https://bugzilla.suse.com/1201725", }, { category: "self", summary: "SUSE Bug 1201768", url: "https://bugzilla.suse.com/1201768", }, { category: "self", summary: "SUSE Bug 1201940", url: "https://bugzilla.suse.com/1201940", }, { category: "self", summary: "SUSE Bug 1201956", url: "https://bugzilla.suse.com/1201956", }, { category: "self", summary: "SUSE Bug 1201958", url: "https://bugzilla.suse.com/1201958", }, { category: "self", summary: "SUSE Bug 1202096", url: "https://bugzilla.suse.com/1202096", }, { category: "self", summary: "SUSE Bug 1202097", url: "https://bugzilla.suse.com/1202097", }, { category: "self", summary: "SUSE Bug 1202113", url: "https://bugzilla.suse.com/1202113", }, { category: "self", summary: "SUSE Bug 1202131", url: "https://bugzilla.suse.com/1202131", }, { category: "self", summary: "SUSE Bug 1202154", url: "https://bugzilla.suse.com/1202154", }, { category: "self", summary: "SUSE Bug 1202262", url: "https://bugzilla.suse.com/1202262", }, { category: "self", summary: "SUSE Bug 1202265", url: "https://bugzilla.suse.com/1202265", }, { category: "self", summary: "SUSE Bug 1202312", url: "https://bugzilla.suse.com/1202312", }, { category: "self", summary: "SUSE Bug 1202346", url: "https://bugzilla.suse.com/1202346", }, { category: "self", summary: "SUSE Bug 1202347", url: "https://bugzilla.suse.com/1202347", }, { category: "self", summary: "SUSE Bug 1202385", url: "https://bugzilla.suse.com/1202385", }, { category: "self", summary: "SUSE Bug 1202393", url: "https://bugzilla.suse.com/1202393", }, { category: "self", summary: "SUSE Bug 1202447", url: "https://bugzilla.suse.com/1202447", }, { category: "self", summary: "SUSE Bug 1202471", url: "https://bugzilla.suse.com/1202471", }, { category: "self", summary: "SUSE Bug 1202558", url: "https://bugzilla.suse.com/1202558", }, { category: "self", summary: "SUSE Bug 1202564", url: "https://bugzilla.suse.com/1202564", }, { category: "self", summary: "SUSE Bug 1202623", url: "https://bugzilla.suse.com/1202623", }, { category: "self", summary: "SUSE Bug 1202636", url: "https://bugzilla.suse.com/1202636", }, { category: "self", summary: "SUSE Bug 1202672", url: "https://bugzilla.suse.com/1202672", }, { category: "self", summary: "SUSE Bug 1202681", url: "https://bugzilla.suse.com/1202681", }, { category: "self", summary: "SUSE Bug 1202710", url: "https://bugzilla.suse.com/1202710", }, { category: "self", summary: "SUSE Bug 1202711", url: "https://bugzilla.suse.com/1202711", }, { category: "self", summary: "SUSE Bug 1202712", url: "https://bugzilla.suse.com/1202712", }, { category: "self", summary: "SUSE Bug 1202713", url: "https://bugzilla.suse.com/1202713", }, { category: "self", summary: "SUSE Bug 1202715", url: "https://bugzilla.suse.com/1202715", }, { category: "self", summary: "SUSE Bug 1202716", url: "https://bugzilla.suse.com/1202716", }, { category: "self", summary: "SUSE Bug 1202757", url: "https://bugzilla.suse.com/1202757", }, { category: "self", summary: "SUSE Bug 1202758", url: "https://bugzilla.suse.com/1202758", }, { category: "self", summary: "SUSE Bug 1202759", url: "https://bugzilla.suse.com/1202759", }, { category: "self", summary: "SUSE Bug 1202761", url: "https://bugzilla.suse.com/1202761", }, { category: "self", summary: "SUSE Bug 1202762", url: "https://bugzilla.suse.com/1202762", }, { category: "self", summary: "SUSE Bug 1202763", url: "https://bugzilla.suse.com/1202763", }, { category: "self", summary: "SUSE Bug 1202764", url: "https://bugzilla.suse.com/1202764", }, { category: "self", summary: "SUSE Bug 1202765", url: "https://bugzilla.suse.com/1202765", }, { category: "self", summary: "SUSE Bug 1202766", url: "https://bugzilla.suse.com/1202766", }, { category: "self", summary: "SUSE Bug 1202767", url: "https://bugzilla.suse.com/1202767", }, { category: "self", summary: "SUSE Bug 1202768", url: "https://bugzilla.suse.com/1202768", }, { category: "self", summary: "SUSE Bug 1202769", url: "https://bugzilla.suse.com/1202769", }, { category: "self", summary: "SUSE Bug 1202770", url: "https://bugzilla.suse.com/1202770", }, { category: "self", summary: "SUSE Bug 1202771", url: "https://bugzilla.suse.com/1202771", }, { category: "self", summary: "SUSE Bug 1202773", url: "https://bugzilla.suse.com/1202773", }, { category: "self", summary: "SUSE Bug 1202774", url: "https://bugzilla.suse.com/1202774", }, { category: "self", summary: "SUSE Bug 1202775", url: "https://bugzilla.suse.com/1202775", }, { category: "self", summary: "SUSE Bug 1202776", url: "https://bugzilla.suse.com/1202776", }, { category: "self", summary: "SUSE Bug 1202778", url: "https://bugzilla.suse.com/1202778", }, { category: "self", summary: "SUSE Bug 1202779", url: "https://bugzilla.suse.com/1202779", }, { category: "self", summary: "SUSE Bug 1202780", url: "https://bugzilla.suse.com/1202780", }, { category: "self", summary: "SUSE Bug 1202781", url: "https://bugzilla.suse.com/1202781", }, { category: "self", summary: "SUSE Bug 1202782", url: "https://bugzilla.suse.com/1202782", }, { category: "self", summary: "SUSE Bug 1202783", url: "https://bugzilla.suse.com/1202783", }, { category: "self", summary: "SUSE Bug 1202822", url: "https://bugzilla.suse.com/1202822", }, { category: "self", summary: "SUSE Bug 1202823", url: "https://bugzilla.suse.com/1202823", }, { category: "self", summary: "SUSE Bug 1202824", url: "https://bugzilla.suse.com/1202824", }, { category: "self", summary: "SUSE Bug 1202860", url: "https://bugzilla.suse.com/1202860", }, { category: "self", summary: "SUSE Bug 1202867", url: "https://bugzilla.suse.com/1202867", }, { category: "self", summary: "SUSE Bug 1202874", url: "https://bugzilla.suse.com/1202874", }, { category: "self", summary: "SUSE Bug 1202898", url: "https://bugzilla.suse.com/1202898", }, { category: "self", summary: "SUSE Bug 1203036", url: "https://bugzilla.suse.com/1203036", }, { category: "self", summary: "SUSE Bug 1203041", url: "https://bugzilla.suse.com/1203041", }, { category: "self", summary: "SUSE Bug 1203063", url: "https://bugzilla.suse.com/1203063", }, { category: "self", summary: "SUSE Bug 1203107", url: "https://bugzilla.suse.com/1203107", }, { category: "self", summary: "SUSE Bug 1203117", url: "https://bugzilla.suse.com/1203117", }, { category: "self", summary: "SUSE Bug 1203138", url: "https://bugzilla.suse.com/1203138", }, { category: "self", summary: "SUSE Bug 1203139", url: "https://bugzilla.suse.com/1203139", }, { category: "self", summary: "SUSE Bug 1203159", url: "https://bugzilla.suse.com/1203159", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2020-36516 page", url: "https://www.suse.com/security/cve/CVE-2020-36516/", }, { category: "self", summary: "SUSE CVE CVE-2021-33135 page", url: "https://www.suse.com/security/cve/CVE-2021-33135/", }, { category: "self", summary: "SUSE CVE CVE-2021-4037 page", url: "https://www.suse.com/security/cve/CVE-2021-4037/", }, { category: "self", summary: "SUSE CVE CVE-2022-20368 page", url: "https://www.suse.com/security/cve/CVE-2022-20368/", }, { category: "self", summary: "SUSE CVE CVE-2022-20369 page", url: "https://www.suse.com/security/cve/CVE-2022-20369/", }, { category: "self", summary: "SUSE CVE CVE-2022-2588 page", url: "https://www.suse.com/security/cve/CVE-2022-2588/", }, { category: "self", summary: "SUSE CVE CVE-2022-2639 page", url: "https://www.suse.com/security/cve/CVE-2022-2639/", }, { category: "self", summary: "SUSE CVE CVE-2022-2663 page", url: "https://www.suse.com/security/cve/CVE-2022-2663/", }, { category: "self", summary: "SUSE CVE CVE-2022-28356 page", url: "https://www.suse.com/security/cve/CVE-2022-28356/", }, { category: "self", summary: "SUSE CVE CVE-2022-28693 page", url: "https://www.suse.com/security/cve/CVE-2022-28693/", }, { category: "self", summary: "SUSE CVE CVE-2022-2873 page", url: "https://www.suse.com/security/cve/CVE-2022-2873/", }, { category: "self", summary: "SUSE CVE CVE-2022-2905 page", url: "https://www.suse.com/security/cve/CVE-2022-2905/", }, { category: "self", summary: "SUSE CVE CVE-2022-2938 page", url: "https://www.suse.com/security/cve/CVE-2022-2938/", }, { category: "self", summary: "SUSE CVE CVE-2022-2959 page", url: "https://www.suse.com/security/cve/CVE-2022-2959/", }, { category: "self", summary: "SUSE CVE CVE-2022-2977 page", url: "https://www.suse.com/security/cve/CVE-2022-2977/", }, { category: "self", summary: "SUSE CVE CVE-2022-3028 page", url: "https://www.suse.com/security/cve/CVE-2022-3028/", }, { category: "self", summary: "SUSE CVE CVE-2022-3078 page", url: "https://www.suse.com/security/cve/CVE-2022-3078/", }, { category: "self", summary: "SUSE CVE CVE-2022-32250 page", url: "https://www.suse.com/security/cve/CVE-2022-32250/", }, { category: "self", summary: "SUSE CVE CVE-2022-36879 page", url: "https://www.suse.com/security/cve/CVE-2022-36879/", }, { category: "self", summary: "SUSE CVE CVE-2022-36946 page", url: "https://www.suse.com/security/cve/CVE-2022-36946/", }, { category: "self", summary: "SUSE CVE CVE-2022-39188 page", url: "https://www.suse.com/security/cve/CVE-2022-39188/", }, { category: "self", summary: "SUSE CVE CVE-2022-39190 page", url: "https://www.suse.com/security/cve/CVE-2022-39190/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-09-16T15:30:19Z", generator: { date: "2022-09-16T15:30:19Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:3293-1", initial_release_date: "2022-09-16T15:30:19Z", revision_history: [ { date: "2022-09-16T15:30:19Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product: { name: "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product_id: "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", product_id: "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product: { name: "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product_id: "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", product: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", product_id: "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-allwinner-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-allwinner-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-altera-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-altera-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-amazon-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-amazon-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-amazon-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-amd-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-amd-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-amlogic-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-amlogic-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-apm-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-apm-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-apple-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-apple-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-apple-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-arm-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-arm-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-broadcom-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-broadcom-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-cavium-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-cavium-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-exynos-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-exynos-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-freescale-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-freescale-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-lg-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-lg-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-marvell-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-marvell-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-mediatek-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-mediatek-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-nvidia-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-nvidia-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-qcom-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-qcom-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-renesas-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-renesas-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-rockchip-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-rockchip-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-socionext-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-socionext-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-sprd-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-sprd-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.14.21-150400.24.21.1.aarch64", product: { name: "dtb-xilinx-5.14.21-150400.24.21.1.aarch64", product_id: "dtb-xilinx-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product: { name: "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product_id: "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", product: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", product_id: "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-64kb-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-64kb-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-default-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-default-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", product: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", product_id: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-default-devel-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-default-devel-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-default-extra-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-default-extra-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-default-optional-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-default-optional-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.21.2.aarch64", product: { name: "kernel-obs-build-5.14.21-150400.24.21.2.aarch64", product_id: "kernel-obs-build-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", product: { name: "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", product_id: "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.21.1.aarch64", product: { name: "kernel-syms-5.14.21-150400.24.21.1.aarch64", product_id: "kernel-syms-5.14.21-150400.24.21.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product: { name: "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product_id: "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", product: { name: "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", product_id: "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product: { name: "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product_id: "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", product_id: "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product: { name: "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", product_id: "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", product_id: "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.21-150400.24.21.2.noarch", product: { name: "kernel-devel-5.14.21-150400.24.21.2.noarch", product_id: "kernel-devel-5.14.21-150400.24.21.2.noarch", }, }, { category: "product_version", name: "kernel-docs-5.14.21-150400.24.21.3.noarch", product: { name: "kernel-docs-5.14.21-150400.24.21.3.noarch", product_id: "kernel-docs-5.14.21-150400.24.21.3.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.14.21-150400.24.21.3.noarch", product: { name: "kernel-docs-html-5.14.21-150400.24.21.3.noarch", product_id: "kernel-docs-html-5.14.21-150400.24.21.3.noarch", }, }, { category: "product_version", name: "kernel-macros-5.14.21-150400.24.21.2.noarch", product: { name: "kernel-macros-5.14.21-150400.24.21.2.noarch", product_id: "kernel-macros-5.14.21-150400.24.21.2.noarch", }, }, { category: "product_version", name: "kernel-source-5.14.21-150400.24.21.2.noarch", product: { name: "kernel-source-5.14.21-150400.24.21.2.noarch", product_id: "kernel-source-5.14.21-150400.24.21.2.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", product: { name: "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", product_id: "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", product_id: "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", product: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", product_id: "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", product: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", product_id: "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-debug-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-debug-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-default-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-default-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", product: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", product_id: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", product: { name: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", product_id: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", product: { name: "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", product_id: "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", product: { name: "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", product_id: "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.21.1.ppc64le", product: { name: "kernel-syms-5.14.21-150400.24.21.1.ppc64le", product_id: "kernel-syms-5.14.21-150400.24.21.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", product: { name: "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", product_id: "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", product_id: "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", product_id: "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", product_id: "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.21.2.s390x", product: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.s390x", product_id: "dlm-kmp-default-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", product: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", product_id: "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.21.2.s390x", product: { name: "kernel-default-5.14.21-150400.24.21.2.s390x", product_id: "kernel-default-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", product: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", product_id: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.21.2.s390x", product: { name: "kernel-default-devel-5.14.21-150400.24.21.2.s390x", product_id: "kernel-default-devel-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.21.2.s390x", product: { name: "kernel-default-extra-5.14.21-150400.24.21.2.s390x", product_id: "kernel-default-extra-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", product: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", product_id: "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.21.2.s390x", product: { name: "kernel-default-optional-5.14.21-150400.24.21.2.s390x", product_id: "kernel-default-optional-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", product: { name: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", product_id: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.21.2.s390x", product: { name: "kernel-obs-build-5.14.21-150400.24.21.2.s390x", product_id: "kernel-obs-build-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.21.1.s390x", product: { name: "kernel-obs-qa-5.14.21-150400.24.21.1.s390x", product_id: "kernel-obs-qa-5.14.21-150400.24.21.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.21.1.s390x", product: { name: "kernel-syms-5.14.21-150400.24.21.1.s390x", product_id: "kernel-syms-5.14.21-150400.24.21.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", product: { name: "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", product_id: "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", product: { name: "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", product_id: "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", product_id: "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", product_id: "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", product_id: "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", product: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", product_id: "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", product: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", product_id: "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-debug-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-debug-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-default-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-default-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", product: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", product_id: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-default-devel-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-default-devel-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-default-extra-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-default-extra-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-default-optional-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-default-optional-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", product_id: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.21.2.x86_64", product: { name: "kernel-obs-build-5.14.21-150400.24.21.2.x86_64", product_id: "kernel-obs-build-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", product: { name: "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", product_id: "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.21.1.x86_64", product: { name: "kernel-syms-5.14.21-150400.24.21.1.x86_64", product_id: "kernel-syms-5.14.21-150400.24.21.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", product: { name: "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", product_id: "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", product_id: "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", product_id: "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP4", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP4", product: { name: "SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP4", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP4", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-64kb-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", }, product_reference: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-devel-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150400.24.21.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", }, product_reference: "kernel-devel-5.14.21-150400.24.21.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150400.24.21.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", }, product_reference: "kernel-macros-5.14.21-150400.24.21.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150400.24.21.3.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", }, product_reference: "kernel-docs-5.14.21-150400.24.21.3.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-obs-build-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150400.24.21.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", }, product_reference: "kernel-source-5.14.21-150400.24.21.2.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.21.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.21.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150400.24.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.21.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", }, product_reference: "kernel-syms-5.14.21-150400.24.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.21.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150400.24.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", }, product_reference: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", }, product_reference: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.21.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, product_reference: "dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-allwinner-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-altera-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amazon-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-amazon-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-amd-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-amlogic-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-apm-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-apple-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-apple-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-arm-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-broadcom-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-cavium-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-exynos-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-freescale-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-lg-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-marvell-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-mediatek-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-nvidia-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-qcom-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-renesas-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-rockchip-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-socionext-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-sprd-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", }, product_reference: "dtb-xilinx-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, product_reference: "gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-64kb-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-debug-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-debug-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", }, product_reference: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-devel-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-extra-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-default-optional-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-default-optional-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-default-optional-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150400.24.21.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", }, product_reference: "kernel-devel-5.14.21-150400.24.21.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150400.24.21.3.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", }, product_reference: "kernel-docs-5.14.21-150400.24.21.3.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.14.21-150400.24.21.3.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", }, product_reference: "kernel-docs-html-5.14.21-150400.24.21.3.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150400.24.21.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", }, product_reference: "kernel-macros-5.14.21-150400.24.21.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-obs-build-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150400.24.21.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", }, product_reference: "kernel-source-5.14.21-150400.24.21.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", }, product_reference: "kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150400.24.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150400.24.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", }, product_reference: "kernel-syms-5.14.21-150400.24.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150400.24.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2020-36516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36516", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36516", url: "https://www.suse.com/security/cve/CVE-2020-36516", }, { category: "external", summary: "SUSE Bug 1196616 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196616", }, { category: "external", summary: "SUSE Bug 1196867 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196867", }, { category: "external", summary: "SUSE Bug 1204092 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204092", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204183", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "important", }, ], title: "CVE-2020-36516", }, { cve: "CVE-2021-33135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-33135", }, ], notes: [ { category: "general", text: "Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-33135", url: "https://www.suse.com/security/cve/CVE-2021-33135", }, { category: "external", summary: "SUSE Bug 1199515 for CVE-2021-33135", url: "https://bugzilla.suse.com/1199515", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2021-33135", }, { cve: "CVE-2021-4037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4037", }, ], notes: [ { category: "general", text: "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4037", url: "https://www.suse.com/security/cve/CVE-2021-4037", }, { category: "external", summary: "SUSE Bug 1198702 for CVE-2021-4037", url: "https://bugzilla.suse.com/1198702", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2021-4037", }, { cve: "CVE-2022-20368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20368", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20368", url: "https://www.suse.com/security/cve/CVE-2022-20368", }, { category: "external", summary: "SUSE Bug 1202346 for CVE-2022-20368", url: "https://bugzilla.suse.com/1202346", }, { category: "external", summary: "SUSE Bug 1212311 for CVE-2022-20368", url: "https://bugzilla.suse.com/1212311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20369", }, ], notes: [ { category: "general", text: "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20369", url: "https://www.suse.com/security/cve/CVE-2022-20369", }, { category: "external", summary: "SUSE Bug 1202347 for CVE-2022-20369", url: "https://bugzilla.suse.com/1202347", }, { category: "external", summary: "SUSE Bug 1212321 for CVE-2022-20369", url: "https://bugzilla.suse.com/1212321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-20369", }, { cve: "CVE-2022-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2588", }, ], notes: [ { category: "general", text: "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2588", url: "https://www.suse.com/security/cve/CVE-2022-2588", }, { category: "external", summary: "SUSE Bug 1202096 for CVE-2022-2588", url: "https://bugzilla.suse.com/1202096", }, { category: "external", summary: "SUSE Bug 1203613 for CVE-2022-2588", url: "https://bugzilla.suse.com/1203613", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2022-2588", url: "https://bugzilla.suse.com/1204183", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-2588", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "important", }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-2639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2639", }, ], notes: [ { category: "general", text: "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2639", url: "https://www.suse.com/security/cve/CVE-2022-2639", }, { category: "external", summary: "SUSE Bug 1202154 for CVE-2022-2639", url: "https://bugzilla.suse.com/1202154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-2639", }, { cve: "CVE-2022-2663", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2663", }, ], notes: [ { category: "general", text: "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2663", url: "https://www.suse.com/security/cve/CVE-2022-2663", }, { category: "external", summary: "SUSE Bug 1202097 for CVE-2022-2663", url: "https://bugzilla.suse.com/1202097", }, { category: "external", summary: "SUSE Bug 1212299 for CVE-2022-2663", url: "https://bugzilla.suse.com/1212299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-2663", }, { cve: "CVE-2022-28356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28356", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28356", url: "https://www.suse.com/security/cve/CVE-2022-28356", }, { category: "external", summary: "SUSE Bug 1197391 for CVE-2022-28356", url: "https://bugzilla.suse.com/1197391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-28356", }, { cve: "CVE-2022-28693", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28693", }, ], notes: [ { category: "general", text: "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28693", url: "https://www.suse.com/security/cve/CVE-2022-28693", }, { category: "external", summary: "SUSE Bug 1201455 for CVE-2022-28693", url: "https://bugzilla.suse.com/1201455", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-28693", }, { cve: "CVE-2022-2873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2873", }, ], notes: [ { category: "general", text: "An out-of-bounds memory access flaw was found in the Linux kernel Intel's iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2873", url: "https://www.suse.com/security/cve/CVE-2022-2873", }, { category: "external", summary: "SUSE Bug 1202558 for CVE-2022-2873", url: "https://bugzilla.suse.com/1202558", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-2873", }, { cve: "CVE-2022-2905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2905", }, ], notes: [ { category: "general", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2905", url: "https://www.suse.com/security/cve/CVE-2022-2905", }, { category: "external", summary: "SUSE Bug 1202860 for CVE-2022-2905", url: "https://bugzilla.suse.com/1202860", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-2938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2938", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2938", url: "https://www.suse.com/security/cve/CVE-2022-2938", }, { category: "external", summary: "SUSE Bug 1202623 for CVE-2022-2938", url: "https://bugzilla.suse.com/1202623", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-2938", }, { cve: "CVE-2022-2959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2959", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2959", url: "https://www.suse.com/security/cve/CVE-2022-2959", }, { category: "external", summary: "SUSE Bug 1202681 for CVE-2022-2959", url: "https://bugzilla.suse.com/1202681", }, { category: "external", summary: "SUSE Bug 1202685 for CVE-2022-2959", url: "https://bugzilla.suse.com/1202685", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "important", }, ], title: "CVE-2022-2959", }, { cve: "CVE-2022-2977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2977", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2977", url: "https://www.suse.com/security/cve/CVE-2022-2977", }, { category: "external", summary: "SUSE Bug 1202672 for CVE-2022-2977", url: "https://bugzilla.suse.com/1202672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-2977", }, { cve: "CVE-2022-3028", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3028", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3028", url: "https://www.suse.com/security/cve/CVE-2022-3028", }, { category: "external", summary: "SUSE Bug 1202898 for CVE-2022-3028", url: "https://bugzilla.suse.com/1202898", }, { category: "external", summary: "SUSE Bug 1212296 for CVE-2022-3028", url: "https://bugzilla.suse.com/1212296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-3078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3078", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3078", url: "https://www.suse.com/security/cve/CVE-2022-3078", }, { category: "external", summary: "SUSE Bug 1203041 for CVE-2022-3078", url: "https://bugzilla.suse.com/1203041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "low", }, ], title: "CVE-2022-3078", }, { cve: "CVE-2022-32250", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32250", }, ], notes: [ { category: "general", text: "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-32250", url: "https://www.suse.com/security/cve/CVE-2022-32250", }, { category: "external", summary: "SUSE Bug 1200015 for CVE-2022-32250", url: "https://bugzilla.suse.com/1200015", }, { category: "external", summary: "SUSE Bug 1200268 for CVE-2022-32250", url: "https://bugzilla.suse.com/1200268", }, { category: "external", summary: "SUSE Bug 1200494 for CVE-2022-32250", url: "https://bugzilla.suse.com/1200494", }, { category: "external", summary: "SUSE Bug 1202992 for CVE-2022-32250", url: "https://bugzilla.suse.com/1202992", }, { category: "external", summary: "SUSE Bug 1202993 for CVE-2022-32250", url: "https://bugzilla.suse.com/1202993", }, { category: "external", summary: "SUSE Bug 1203002 for CVE-2022-32250", url: "https://bugzilla.suse.com/1203002", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "important", }, ], title: "CVE-2022-32250", }, { cve: "CVE-2022-36879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36879", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36879", url: "https://www.suse.com/security/cve/CVE-2022-36879", }, { category: "external", summary: "SUSE Bug 1201948 for CVE-2022-36879", url: "https://bugzilla.suse.com/1201948", }, { category: "external", summary: "SUSE Bug 1212327 for CVE-2022-36879", url: "https://bugzilla.suse.com/1212327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36946", }, ], notes: [ { category: "general", text: "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36946", url: "https://www.suse.com/security/cve/CVE-2022-36946", }, { category: "external", summary: "SUSE Bug 1201940 for CVE-2022-36946", url: "https://bugzilla.suse.com/1201940", }, { category: "external", summary: "SUSE Bug 1201941 for CVE-2022-36946", url: "https://bugzilla.suse.com/1201941", }, { category: "external", summary: "SUSE Bug 1202312 for CVE-2022-36946", url: "https://bugzilla.suse.com/1202312", }, { category: "external", summary: "SUSE Bug 1202874 for CVE-2022-36946", url: "https://bugzilla.suse.com/1202874", }, { category: "external", summary: "SUSE Bug 1203208 for CVE-2022-36946", url: "https://bugzilla.suse.com/1203208", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-36946", url: "https://bugzilla.suse.com/1204132", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-36946", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1212310 for CVE-2022-36946", url: "https://bugzilla.suse.com/1212310", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "important", }, ], title: "CVE-2022-36946", }, { cve: "CVE-2022-39188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39188", }, ], notes: [ { category: "general", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39188", url: "https://www.suse.com/security/cve/CVE-2022-39188", }, { category: "external", summary: "SUSE Bug 1203107 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203107", }, { category: "external", summary: "SUSE Bug 1203116 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203116", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-39188", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-39188", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1212326 for CVE-2022-39188", url: "https://bugzilla.suse.com/1212326", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39190", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39190", }, ], notes: [ { category: "general", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39190", url: "https://www.suse.com/security/cve/CVE-2022-39190", }, { category: "external", summary: "SUSE Bug 1203117 for CVE-2022-39190", url: "https://bugzilla.suse.com/1203117", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_21-default-1-150400.9.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.21.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.21.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.21.2.150400.24.7.2.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.21.3.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.21.2.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.21.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.21.2.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.21.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-16T15:30:19Z", details: "moderate", }, ], title: "CVE-2022-39190", }, ], }
suse-su-2022:3450-1
Vulnerability from csaf_suse
Published
2022-09-28 06:48
Modified
2022-09-28 06:48
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).
- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-1012: Fixed a memory leak problem that was found in the TCP source port generation algorithm in net/ipv4/tcp.c (bnc#1199482).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2022-32250: Fixed a privilege escalation issue in net/netfilter/nf_tables_api.c that allowed a local user to became root (bnc#1200015)
- CVE-2022-29581: Fixed improper update of reference count vulnerability in net/sched that allowed a local attacker to cause privilege escalation to root (bnc#1199665).
- CVE-2022-20166: Fixed possible out of bounds write due to a heap buffer overflow in various methods of kernel base drivers (bnc#1200598).
The following non-security bugs were fixed:
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1188944).
- cifs: skip trailing separators of prefix paths (bsc#1188944).
- config: Update files NVRAM=y (bsc#1201361 bsc#1192968).
- kernel-obs-build: include qemu_fw_cfg (boo#1201705)
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).
- tcp: change source port randomizarion at connect() time (bsc#1180153).
Patchnames
SUSE-2022-3450,SUSE-SLE-Module-Live-Patching-15-SP2-2022-3450,SUSE-SLE-Product-HA-15-SP2-2022-3450,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3450,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3450,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3450,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3450,SUSE-Storage-7-2022-3450
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-1012: Fixed a memory leak problem that was found in the TCP source port generation algorithm in net/ipv4/tcp.c (bnc#1199482).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).\n- CVE-2022-32250: Fixed a privilege escalation issue in net/netfilter/nf_tables_api.c that allowed a local user to became root (bnc#1200015)\n- CVE-2022-29581: Fixed improper update of reference count vulnerability in net/sched that allowed a local attacker to cause privilege escalation to root (bnc#1199665).\n- CVE-2022-20166: Fixed possible out of bounds write due to a heap buffer overflow in various methods of kernel base drivers (bnc#1200598).\n\nThe following non-security bugs were fixed:\n\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1188944).\n- cifs: skip trailing separators of prefix paths (bsc#1188944).\n- config: Update files NVRAM=y (bsc#1201361 bsc#1192968).\n- kernel-obs-build: include qemu_fw_cfg (boo#1201705)\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).\n- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).\n- tcp: change source port randomizarion at connect() time (bsc#1180153).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-3450,SUSE-SLE-Module-Live-Patching-15-SP2-2022-3450,SUSE-SLE-Product-HA-15-SP2-2022-3450,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3450,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3450,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3450,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3450,SUSE-Storage-7-2022-3450", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3450-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:3450-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20223450-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:3450-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html", }, { category: "self", summary: "SUSE Bug 1023051", url: "https://bugzilla.suse.com/1023051", }, { category: "self", summary: "SUSE Bug 1180153", url: "https://bugzilla.suse.com/1180153", }, { category: "self", summary: "SUSE Bug 1188944", url: "https://bugzilla.suse.com/1188944", }, { category: "self", summary: "SUSE Bug 1191881", url: "https://bugzilla.suse.com/1191881", }, { category: "self", summary: "SUSE Bug 1192968", url: "https://bugzilla.suse.com/1192968", }, { category: "self", summary: "SUSE Bug 1194272", url: "https://bugzilla.suse.com/1194272", }, { category: "self", summary: "SUSE Bug 1194535", url: "https://bugzilla.suse.com/1194535", }, { category: "self", summary: "SUSE Bug 1196616", url: "https://bugzilla.suse.com/1196616", }, { category: "self", summary: "SUSE Bug 1197158", url: "https://bugzilla.suse.com/1197158", }, { category: "self", summary: "SUSE Bug 1199482", url: "https://bugzilla.suse.com/1199482", }, { category: "self", summary: "SUSE Bug 1199665", url: "https://bugzilla.suse.com/1199665", }, { category: "self", summary: "SUSE Bug 1201726", url: "https://bugzilla.suse.com/1201726", }, { category: "self", summary: "SUSE Bug 1201948", url: "https://bugzilla.suse.com/1201948", }, { category: "self", summary: "SUSE Bug 1202096", url: "https://bugzilla.suse.com/1202096", }, { category: "self", summary: "SUSE Bug 1202097", url: "https://bugzilla.suse.com/1202097", }, { category: "self", summary: "SUSE Bug 1202154", url: "https://bugzilla.suse.com/1202154", }, { category: "self", summary: "SUSE Bug 1202346", url: "https://bugzilla.suse.com/1202346", }, { category: "self", summary: "SUSE Bug 1202347", url: "https://bugzilla.suse.com/1202347", }, { category: "self", summary: "SUSE Bug 1202393", url: "https://bugzilla.suse.com/1202393", }, { category: "self", summary: "SUSE Bug 1202396", url: "https://bugzilla.suse.com/1202396", }, { category: "self", summary: "SUSE Bug 1202564", url: "https://bugzilla.suse.com/1202564", }, { category: "self", summary: "SUSE Bug 1202672", url: "https://bugzilla.suse.com/1202672", }, { category: "self", summary: "SUSE Bug 1202860", url: "https://bugzilla.suse.com/1202860", }, { category: "self", summary: "SUSE Bug 1202895", url: "https://bugzilla.suse.com/1202895", }, { category: "self", summary: "SUSE Bug 1202898", url: "https://bugzilla.suse.com/1202898", }, { category: "self", summary: "SUSE Bug 1203098", url: "https://bugzilla.suse.com/1203098", }, { category: "self", summary: "SUSE Bug 1203107", url: "https://bugzilla.suse.com/1203107", }, { category: "self", summary: "SUSE Bug 1203159", url: "https://bugzilla.suse.com/1203159", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2020-27784 page", url: "https://www.suse.com/security/cve/CVE-2020-27784/", }, { category: "self", summary: "SUSE CVE CVE-2020-36516 page", url: "https://www.suse.com/security/cve/CVE-2020-36516/", }, { category: "self", summary: "SUSE CVE CVE-2021-4155 page", url: "https://www.suse.com/security/cve/CVE-2021-4155/", }, { category: "self", summary: "SUSE CVE CVE-2021-4203 page", url: "https://www.suse.com/security/cve/CVE-2021-4203/", }, { category: "self", summary: "SUSE CVE CVE-2022-1012 page", url: "https://www.suse.com/security/cve/CVE-2022-1012/", }, { category: "self", summary: "SUSE CVE CVE-2022-20166 page", url: "https://www.suse.com/security/cve/CVE-2022-20166/", }, { category: "self", summary: "SUSE CVE CVE-2022-20368 page", url: "https://www.suse.com/security/cve/CVE-2022-20368/", }, { category: "self", summary: "SUSE CVE CVE-2022-20369 page", url: "https://www.suse.com/security/cve/CVE-2022-20369/", }, { category: "self", summary: "SUSE CVE CVE-2022-2588 page", url: "https://www.suse.com/security/cve/CVE-2022-2588/", }, { category: "self", summary: "SUSE CVE CVE-2022-26373 page", url: "https://www.suse.com/security/cve/CVE-2022-26373/", }, { category: "self", summary: "SUSE CVE CVE-2022-2639 page", url: "https://www.suse.com/security/cve/CVE-2022-2639/", }, { category: "self", summary: "SUSE CVE CVE-2022-2663 page", url: "https://www.suse.com/security/cve/CVE-2022-2663/", }, { category: "self", summary: "SUSE CVE CVE-2022-2905 page", url: "https://www.suse.com/security/cve/CVE-2022-2905/", }, { category: "self", summary: "SUSE CVE CVE-2022-29581 page", url: "https://www.suse.com/security/cve/CVE-2022-29581/", }, { category: "self", summary: "SUSE CVE CVE-2022-2977 page", url: "https://www.suse.com/security/cve/CVE-2022-2977/", }, { category: "self", summary: "SUSE CVE CVE-2022-3028 page", url: "https://www.suse.com/security/cve/CVE-2022-3028/", }, { category: "self", summary: "SUSE CVE CVE-2022-32250 page", url: "https://www.suse.com/security/cve/CVE-2022-32250/", }, { category: "self", summary: "SUSE CVE CVE-2022-36879 page", url: "https://www.suse.com/security/cve/CVE-2022-36879/", }, { category: "self", summary: "SUSE CVE CVE-2022-39188 page", url: "https://www.suse.com/security/cve/CVE-2022-39188/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-09-28T06:48:59Z", generator: { date: "2022-09-28T06:48:59Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:3450-1", initial_release_date: "2022-09-28T06:48:59Z", revision_history: [ { date: "2022-09-28T06:48:59Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", product_id: "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-default-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-default-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", product: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", product_id: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-default-extra-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-default-extra-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-obs-qa-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-preempt-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-preempt-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.129.1.aarch64", product: { name: "kernel-syms-5.3.18-150200.24.129.1.aarch64", product_id: "kernel-syms-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.129.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150200.24.129.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150200.24.129.1.noarch", product: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch", product_id: "kernel-devel-5.3.18-150200.24.129.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150200.24.129.1.noarch", product: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch", product_id: "kernel-docs-5.3.18-150200.24.129.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150200.24.129.1.noarch", product: { name: "kernel-docs-html-5.3.18-150200.24.129.1.noarch", product_id: "kernel-docs-html-5.3.18-150200.24.129.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150200.24.129.1.noarch", product: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch", product_id: "kernel-macros-5.3.18-150200.24.129.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150200.24.129.1.noarch", product: { name: "kernel-source-5.3.18-150200.24.129.1.noarch", product_id: "kernel-source-5.3.18-150200.24.129.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150200.24.129.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-150200.24.129.1.noarch", product_id: "kernel-source-vanilla-5.3.18-150200.24.129.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-debug-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-debug-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-default-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-default-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", product: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", product_id: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-default-extra-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", product_id: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.129.1.ppc64le", product: { name: "kernel-syms-5.3.18-150200.24.129.1.ppc64le", product_id: "kernel-syms-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.129.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150200.24.129.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.129.1.s390x", product: { name: "dlm-kmp-default-5.3.18-150200.24.129.1.s390x", product_id: "dlm-kmp-default-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", product_id: "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.129.1.s390x", product: { name: "kernel-default-5.3.18-150200.24.129.1.s390x", product_id: "kernel-default-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", product: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", product_id: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.129.1.s390x", product: { name: "kernel-default-devel-5.3.18-150200.24.129.1.s390x", product_id: "kernel-default-devel-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.129.1.s390x", product: { name: "kernel-default-extra-5.3.18-150200.24.129.1.s390x", product_id: "kernel-default-extra-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", product_id: "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", product: { name: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", product_id: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.129.1.s390x", product: { name: "kernel-obs-build-5.3.18-150200.24.129.1.s390x", product_id: "kernel-obs-build-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.129.1.s390x", product: { name: "kernel-obs-qa-5.3.18-150200.24.129.1.s390x", product_id: "kernel-obs-qa-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.129.1.s390x", product: { name: "kernel-syms-5.3.18-150200.24.129.1.s390x", product_id: "kernel-syms-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150200.24.129.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-150200.24.129.1.s390x", product_id: "kernel-zfcpdump-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.129.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-150200.24.129.1.s390x", product_id: "kselftests-kmp-default-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", product_id: "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-debug-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-debug-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-debug-devel-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-default-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", product: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", product_id: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-default-extra-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-default-extra-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_129-preempt-1-150200.5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150200_24_129-preempt-1-150200.5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150200_24_129-preempt-1-150200.5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-obs-qa-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.129.1.x86_64", product: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64", product_id: "kernel-syms-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.129.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150200.24.129.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP2", product: { name: "SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.129.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2020-27784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27784", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27784", url: "https://www.suse.com/security/cve/CVE-2020-27784", }, { category: "external", summary: "SUSE Bug 1202895 for CVE-2020-27784", url: "https://bugzilla.suse.com/1202895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "low", }, ], title: "CVE-2020-27784", }, { cve: "CVE-2020-36516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36516", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36516", url: "https://www.suse.com/security/cve/CVE-2020-36516", }, { category: "external", summary: "SUSE Bug 1196616 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196616", }, { category: "external", summary: "SUSE Bug 1196867 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196867", }, { category: "external", summary: "SUSE Bug 1204092 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204092", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204183", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "important", }, ], title: "CVE-2020-36516", }, { cve: "CVE-2021-4155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4155", }, ], notes: [ { category: "general", text: "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4155", url: "https://www.suse.com/security/cve/CVE-2021-4155", }, { category: "external", summary: "SUSE Bug 1194272 for CVE-2021-4155", url: "https://bugzilla.suse.com/1194272", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-4155", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-4155", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2021-4155", }, { cve: "CVE-2021-4203", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4203", }, ], notes: [ { category: "general", text: "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4203", url: "https://www.suse.com/security/cve/CVE-2021-4203", }, { category: "external", summary: "SUSE Bug 1194535 for CVE-2021-4203", url: "https://bugzilla.suse.com/1194535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2021-4203", }, { cve: "CVE-2022-1012", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1012", }, ], notes: [ { category: "general", text: "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1012", url: "https://www.suse.com/security/cve/CVE-2022-1012", }, { category: "external", summary: "SUSE Bug 1199482 for CVE-2022-1012", url: "https://bugzilla.suse.com/1199482", }, { category: "external", summary: "SUSE Bug 1199694 for CVE-2022-1012", url: "https://bugzilla.suse.com/1199694", }, { category: "external", summary: "SUSE Bug 1202335 for CVE-2022-1012", url: "https://bugzilla.suse.com/1202335", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-1012", }, { cve: "CVE-2022-20166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20166", }, ], notes: [ { category: "general", text: "In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20166", url: "https://www.suse.com/security/cve/CVE-2022-20166", }, { category: "external", summary: "SUSE Bug 1200598 for CVE-2022-20166", url: "https://bugzilla.suse.com/1200598", }, { category: "external", summary: "SUSE Bug 1212284 for CVE-2022-20166", url: "https://bugzilla.suse.com/1212284", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-20166", }, { cve: "CVE-2022-20368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20368", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20368", url: "https://www.suse.com/security/cve/CVE-2022-20368", }, { category: "external", summary: "SUSE Bug 1202346 for CVE-2022-20368", url: "https://bugzilla.suse.com/1202346", }, { category: "external", summary: "SUSE Bug 1212311 for CVE-2022-20368", url: "https://bugzilla.suse.com/1212311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20369", }, ], notes: [ { category: "general", text: "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20369", url: "https://www.suse.com/security/cve/CVE-2022-20369", }, { category: "external", summary: "SUSE Bug 1202347 for CVE-2022-20369", url: "https://bugzilla.suse.com/1202347", }, { category: "external", summary: "SUSE Bug 1212321 for CVE-2022-20369", url: "https://bugzilla.suse.com/1212321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-20369", }, { cve: "CVE-2022-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2588", }, ], notes: [ { category: "general", text: "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2588", url: "https://www.suse.com/security/cve/CVE-2022-2588", }, { category: "external", summary: "SUSE Bug 1202096 for CVE-2022-2588", url: "https://bugzilla.suse.com/1202096", }, { category: "external", summary: "SUSE Bug 1203613 for CVE-2022-2588", url: "https://bugzilla.suse.com/1203613", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2022-2588", url: "https://bugzilla.suse.com/1204183", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-2588", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "important", }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-26373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26373", }, ], notes: [ { category: "general", text: "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26373", url: "https://www.suse.com/security/cve/CVE-2022-26373", }, { category: "external", summary: "SUSE Bug 1201726 for CVE-2022-26373", url: "https://bugzilla.suse.com/1201726", }, { category: "external", summary: "SUSE Bug 1209619 for CVE-2022-26373", url: "https://bugzilla.suse.com/1209619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2639", }, ], notes: [ { category: "general", text: "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2639", url: "https://www.suse.com/security/cve/CVE-2022-2639", }, { category: "external", summary: "SUSE Bug 1202154 for CVE-2022-2639", url: "https://bugzilla.suse.com/1202154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-2639", }, { cve: "CVE-2022-2663", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2663", }, ], notes: [ { category: "general", text: "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2663", url: "https://www.suse.com/security/cve/CVE-2022-2663", }, { category: "external", summary: "SUSE Bug 1202097 for CVE-2022-2663", url: "https://bugzilla.suse.com/1202097", }, { category: "external", summary: "SUSE Bug 1212299 for CVE-2022-2663", url: "https://bugzilla.suse.com/1212299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-2663", }, { cve: "CVE-2022-2905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2905", }, ], notes: [ { category: "general", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2905", url: "https://www.suse.com/security/cve/CVE-2022-2905", }, { category: "external", summary: "SUSE Bug 1202860 for CVE-2022-2905", url: "https://bugzilla.suse.com/1202860", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-29581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29581", }, ], notes: [ { category: "general", text: "Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29581", url: "https://www.suse.com/security/cve/CVE-2022-29581", }, { category: "external", summary: "SUSE Bug 1199665 for CVE-2022-29581", url: "https://bugzilla.suse.com/1199665", }, { category: "external", summary: "SUSE Bug 1199695 for CVE-2022-29581", url: "https://bugzilla.suse.com/1199695", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-29581", url: "https://bugzilla.suse.com/1205313", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "important", }, ], title: "CVE-2022-29581", }, { cve: "CVE-2022-2977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2977", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2977", url: "https://www.suse.com/security/cve/CVE-2022-2977", }, { category: "external", summary: "SUSE Bug 1202672 for CVE-2022-2977", url: "https://bugzilla.suse.com/1202672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-2977", }, { cve: "CVE-2022-3028", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3028", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3028", url: "https://www.suse.com/security/cve/CVE-2022-3028", }, { category: "external", summary: "SUSE Bug 1202898 for CVE-2022-3028", url: "https://bugzilla.suse.com/1202898", }, { category: "external", summary: "SUSE Bug 1212296 for CVE-2022-3028", url: "https://bugzilla.suse.com/1212296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-32250", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32250", }, ], notes: [ { category: "general", text: "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-32250", url: "https://www.suse.com/security/cve/CVE-2022-32250", }, { category: "external", summary: "SUSE Bug 1200015 for CVE-2022-32250", url: "https://bugzilla.suse.com/1200015", }, { category: "external", summary: "SUSE Bug 1200268 for CVE-2022-32250", url: "https://bugzilla.suse.com/1200268", }, { category: "external", summary: "SUSE Bug 1200494 for CVE-2022-32250", url: "https://bugzilla.suse.com/1200494", }, { category: "external", summary: "SUSE Bug 1202992 for CVE-2022-32250", url: "https://bugzilla.suse.com/1202992", }, { category: "external", summary: "SUSE Bug 1202993 for CVE-2022-32250", url: "https://bugzilla.suse.com/1202993", }, { category: "external", summary: "SUSE Bug 1203002 for CVE-2022-32250", url: "https://bugzilla.suse.com/1203002", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "important", }, ], title: "CVE-2022-32250", }, { cve: "CVE-2022-36879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36879", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36879", url: "https://www.suse.com/security/cve/CVE-2022-36879", }, { category: "external", summary: "SUSE Bug 1201948 for CVE-2022-36879", url: "https://bugzilla.suse.com/1201948", }, { category: "external", summary: "SUSE Bug 1212327 for CVE-2022-36879", url: "https://bugzilla.suse.com/1212327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-36879", }, { cve: "CVE-2022-39188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39188", }, ], notes: [ { category: "general", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39188", url: "https://www.suse.com/security/cve/CVE-2022-39188", }, { category: "external", summary: "SUSE Bug 1203107 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203107", }, { category: "external", summary: "SUSE Bug 1203116 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203116", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-39188", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-39188", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1212326 for CVE-2022-39188", url: "https://bugzilla.suse.com/1212326", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-09-28T06:48:59Z", details: "moderate", }, ], title: "CVE-2022-39188", }, ], }
suse-su-2022:4617-1
Vulnerability from csaf_suse
Published
2022-12-23 10:39
Modified
2022-12-23 10:39
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).
- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).
- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).
- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).
- CVE-2022-3633: Fixed a memory leak in j1939_session_destroy of the file net/can/j1939/transport.c (bsc#1204650).
- CVE-2022-3114: Fixed a denial of service in imx_register_uart_clocks() in drivers/clk/imx/clk.c (bsc#1206391).
- CVE-2022-3619: Fixed a memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (bsc#1204569).
- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).
- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).
- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).
- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).
- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).
- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).
- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).
- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).
- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).
- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).
- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).
- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bsc#1204653).
- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).
- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).
- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).
- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).
- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).
- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).
- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).
- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).
- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).
- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).
- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).
- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).
- CVE-2022-3545: Fixed a use-after-free vulnerability is area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).
- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).
- CVE-2022-2153: Fixed a NULL pointer dereference in KVM when attempting to set a SynIC IRQ (bsc#1200788).
- CVE-2022-33981: Fixed a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function (bsc#1200692).
- CVE-2022-45869: Fixed a race condition in the x86 KVM subsystem which could cause a denial of service (bsc#1205882).
- CVE-2022-45888: Fixed a use-after-free during physical removal of a USB devices when using drivers/char/xillybus/xillyusb.c (bsc#1205764).
- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).
- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)
- CVE-2022-3566: Fixed a race condition in the functions tcp_getsockopt/tcp_setsockopt. The manipulation leads to a race condition (bsc#1204405).
- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).
- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).
- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).
- CVE-2022-3625: Fixed a user-after-free vulnerability in devlink_param_set/devlink_param_get of the file net/core/devlink.c (bsc#1204637).
- CVE-2022-3535: Fixed a memory leak in mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bsc#1204417).
- CVE-2022-39189: Fixed an issue were an unprivileged guest users can compromise the guest kernel because TLB flush operations were mishandled in certain KVM_VCPU_PREEMPTED situations (bsc#1203066).
- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).
- CVE-2022-2978: Fixed a use-after-free in the NILFS file system (bsc#1202700).
- CVE-2022-1184: Fixed a use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (bsc#1198577).
- CVE-2022-1263: Fixed a NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allowed an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service (bsc#1198189).
- CVE-2022-1882: Fixed a use-after-free flaw in free_pipe_info() that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1199904).
- CVE-2022-20369: Fixed possible out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bsc#1202347).
- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-26373: Fixed CPU information leak via post-barrier RSB predictions (bsc#1201726).
- CVE-2022-2639: Fixed integer underflow that could lead to out-of-bounds write in reserve_sfa_size() (bsc#1202154).
- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2022-28356: Fixed a refcount bug in llc_ui_bind and llc_ui_autobind which could allow an unprivileged user to execute a denial of service. (bsc#1197391)
- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bsc#1202558).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202860).
- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bsc#1202623).
- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bsc#1202681).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-3028: Fixed a race condition that was found in the IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bsc#1202898).
- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bsc#1203041).
- CVE-2022-3202: Fixed a NULL pointer dereference flaw in Journaled File System. This could allow a local attacker to crash the system or leak kernel internal information (bsc#1203389).
- CVE-2022-32250: Fixed user-after-free in net/netfilter/nf_tables_api.c that could allow local privilege escalation (bsc#1200015).
- CVE-2022-32296: Fixed vulnerability where TCP servers were allowed to identify clients by observing what source ports are used (bsc#1200288).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bsc#1203552).
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bsc#1203769).
- CVE-2022-3435: Fixed an out-of-bounds read in fib_nh_match() of the file net/ipv4/fib_semantics.c (bsc#1204171).
- CVE-2022-3526: Fixed a memory leak in macvlan_handle_frame() from drivers/net/macvlan.c (bsc#1204353).
- CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/l2cap_core.c (bsc#1204619).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bsc#1201948).
- CVE-2022-36946: Fixed a denial of service inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bsc#1201940).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bsc#1203107).
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bsc#1203117).
- CVE-2022-40476: Fixed a null pointer dereference in fs/io_uring.c (bsc#1203435).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bsc#1202960).
- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).
- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bsc#1203987).
- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bsc#1203992).
- CVE-2022-42719: Fixed remote code execution with wlan frames when parsing a multi-BSSID element (bsc#1204051).
- CVE-2022-42720: Fixed remote code execution due to refcounting bugs (bsc#1204059).
- CVE-2022-42721: Fixed remote code execution due list corruption in the wlan stack (bsc#1204060).
- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)
- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bsc#1199515).
- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bsc#1177471)
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bsc#1196616).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bsc#1023051).
The following non-security bugs were fixed:
- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).
- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).
- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).
- ACPI / scan: Create platform device for CS35L41 (bsc#1203699).
- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() (git-fixes).
- ACPI: APEI: do not add task_work to kernel thread to avoid memory leak (git-fixes).
- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: HMAT: Fix initiator registration for single-initiator systems (git-fixes).
- ACPI: HMAT: Release platform device in case of platform_device_add_data() fails (git-fixes).
- ACPI: HMAT: remove unnecessary variable initialization (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: VIOT: Fix ACS setup (git-fixes).
- ACPI: extlog: Handle multiple records (git-fixes).
- ACPI: processor idle: Practically limit 'Dummy wait' workaround to old Intel systems (bsc#1203767).
- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: resource: skip IRQ override on AMD Zen platforms (git-fixes).
- ACPI: scan: Add CLSA0101 Laptop Support (bsc#1203699).
- ACPI: scan: Add LATT2021 to acpi_ignore_dep_ids[] (git-fixes).
- ACPI: tables: FPDT: Do not call acpi_os_map_memory() on invalid phys address (git-fixes).
- ACPI: thermal: drop an always true check (git-fixes).
- ACPI: utils: Add api to read _SUB from ACPI (bsc#1203699).
- ACPI: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ACPI: video: Make backlight class device registration a separate step (v2) (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ACPI: x86: Add a quirk for Dell Inspiron 14 2-in-1 for StorageD3Enable (git-fixes).
- ACPI: x86: Add another system to quirk list for forcing StorageD3Enable (git-fixes).
- ALSA: Use del_timer_sync() before freeing timer (git-fixes).
- ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() (git-fixes).
- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).
- ALSA: aoa: Fix I2S device accounting (git-fixes).
- ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() (git-fixes).
- ALSA: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).
- ALSA: au88x0: use explicitly signed char (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: core: Fix double-free at snd_card_new() (git-fixes).
- ALSA: cs35l41: Check hw_config before using it (bsc#1203699).
- ALSA: cs35l41: Enable Internal Boost in shared lib (bsc#1203699).
- ALSA: cs35l41: Move cs35l41_gpio_config to shared lib (bsc#1203699).
- ALSA: cs35l41: Unify hardware configuration (bsc#1203699).
- ALSA: dice: fix regression for Lexicon I-ONIX FW810S (git-fixes).
- ALSA: dmaengine: increment buffer pointer atomically (git-fixes).
- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).
- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).
- ALSA: hda/cs8409: Add Speaker Playback Switch for Cyborg (bsc#1203699).
- ALSA: hda/cs8409: Add Speaker Playback Switch for Warlock (bsc#1203699).
- ALSA: hda/cs8409: Add new Dolphin HW variants (bsc#1203699).
- ALSA: hda/cs8409: Disable HSBIAS_SENSE_EN for Cyborg (bsc#1203699).
- ALSA: hda/cs8409: Fix Full Scale Volume setting for all variants (bsc#1203699).
- ALSA: hda/cs8409: Fix Warlock to use mono mic configuration (bsc#1203699).
- ALSA: hda/cs8409: Re-order quirk table into ascending order (bsc#1203699).
- ALSA: hda/cs8409: Support manual mode detection for CS42L42 (bsc#1203699).
- ALSA: hda/cs8409: Support new Dolphin Variants (bsc#1203699).
- ALSA: hda/cs8409: Support new Odin Variants (bsc#1203699).
- ALSA: hda/cs8409: Support new Warlock MLK Variants (bsc#1203699).
- ALSA: hda/cs8409: Use general cs42l42 include in cs8409 hda driver (bsc#1203699).
- ALSA: hda/cs8409: change cs8409_fixups v.pins initializers to static (bsc#1203699).
- ALSA: hda/cs_dsp_ctl: Fix mutex inversion when creating controls (bsc#1203699).
- ALSA: hda/hdmi - enable runtime pm for more AMD display audio (git-fixes).
- ALSA: hda/hdmi: Do not skip notification handling during PM operation (git-fixes).
- ALSA: hda/hdmi: Fix the converter allocation for the silent stream (git-fixes).
- ALSA: hda/hdmi: Fix the converter reuse for the silent stream (git-fixes).
- ALSA: hda/hdmi: change type for the 'assigned' variable (git-fixes).
- ALSA: hda/realtek: Add CS35L41 support for Thinkpad laptops (bsc#1203699).
- ALSA: hda/realtek: Add Intel Reference SSID to support headset keys (git-fixes).
- ALSA: hda/realtek: Add Positivo C6300 model quirk (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 16 (8902) mute LED (git-fixes).
- ALSA: hda/realtek: Add another HP ZBook G9 model quirks (bsc#1203699).
- ALSA: hda/realtek: Add mute and micmut LED support for Zbook Fury 17 G9 (bsc#1203699).
- ALSA: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).
- ALSA: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (bsc#1203922).
- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model (bsc#1203699).
- ALSA: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo Yoga7 14IAL7 (bsc#1203699).
- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS Zenbooks using CS35L41 (bsc#1203699).
- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).
- ALSA: hda/realtek: Add support for HP Laptops (bsc#1203699).
- ALSA: hda/realtek: Add support for Legion 7 16ACHg6 laptop (bsc#1203699).
- ALSA: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5570 laptop (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845/865 G9 (bsc#1203699).
- ALSA: hda/realtek: Enable mute/micmute LEDs support for HP Laptops (bsc#1203699).
- ALSA: hda/realtek: Enable speaker and mute LEDs for HP laptops (bsc#1203699).
- ALSA: hda/realtek: Fix LED on Zbook Studio G9 (bsc#1203699).
- ALSA: hda/realtek: Fix mute led issue on thinkpad with cs35l41 s-codec (bsc#1203699).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (bsc#1205100).
- ALSA: hda/realtek: More robust component matching for CS35L41 (bsc#1203699).
- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).
- ALSA: hda/realtek: fix speakers for Samsung Galaxy Book Pro (bsc#1205100).
- ALSA: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes).
- ALSA: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).
- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).
- ALSA: hda/tegra: Add Tegra234 hda driver support (git-fixes).
- ALSA: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).
- ALSA: hda/tegra: Update scratch reg. communication (git-fixes).
- ALSA: hda/tegra: set depop delay for tegra (git-fixes).
- ALSA: hda: Fix Nvidia dp infoframe (git-fixes).
- ALSA: hda: Fix dependencies of CS35L41 on SPI/I2C buses (bsc#1203699).
- ALSA: hda: Fix dependency on ASoC cs35l41 codec (bsc#1203699).
- ALSA: hda: Fix hang at HD-audio codec unbinding due to refcount saturation (git-fixes).
- ALSA: hda: Fix position reporting on Poulsbo (git-fixes).
- ALSA: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).
- ALSA: hda: cs35l41: Add Amp Name based on channel and index (bsc#1203699).
- ALSA: hda: cs35l41: Add Boost type flag (bsc#1203699).
- ALSA: hda: cs35l41: Add Support for Interrupts (bsc#1203699).
- ALSA: hda: cs35l41: Add calls to newly added test key function (bsc#1203699).
- ALSA: hda: cs35l41: Add defaulted values into dsp bypass config sequence (bsc#1203699).
- ALSA: hda: cs35l41: Add initial DSP support and firmware loading (bsc#1203699).
- ALSA: hda: cs35l41: Add missing default cases (bsc#1203699).
- ALSA: hda: cs35l41: Add module parameter to control firmware load (bsc#1203699).
- ALSA: hda: cs35l41: Add support for CS35L41 in HDA systems (bsc#1203699).
- ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations (bsc#1203699).
- ALSA: hda: cs35l41: Always configure the DAI (bsc#1203699).
- ALSA: hda: cs35l41: Avoid overwriting register patch (bsc#1203699).
- ALSA: hda: cs35l41: Clarify support for CSC3551 without _DSD Properties (bsc#1203699).
- ALSA: hda: cs35l41: Consolidate selections under SND_HDA_SCODEC_CS35L41 (bsc#1203699).
- ALSA: hda: cs35l41: Do not dereference fwnode handle (bsc#1203699).
- ALSA: hda: cs35l41: Drop wrong use of ACPI_PTR() (bsc#1203699).
- ALSA: hda: cs35l41: Enable GPIO2 Interrupt for CLSA0100 laptops (bsc#1203699).
- ALSA: hda: cs35l41: Fix I2S params comments (bsc#1203699).
- ALSA: hda: cs35l41: Fix comments wrt serial-multi-instantiate reference (bsc#1203699).
- ALSA: hda: cs35l41: Fix error in spi cs35l41 hda driver name (bsc#1203699).
- ALSA: hda: cs35l41: Handle all external boost setups the same way (bsc#1203699).
- ALSA: hda: cs35l41: Improve dev_err_probe() messaging (bsc#1203699).
- ALSA: hda: cs35l41: Make cs35l41_hda_remove() return void (bsc#1203699).
- ALSA: hda: cs35l41: Make use of the helper function dev_err_probe() (bsc#1203699).
- ALSA: hda: cs35l41: Move boost config to initialization code (bsc#1203699).
- ALSA: hda: cs35l41: Move cs35l41* calls to its own symbol namespace (bsc#1203699).
- ALSA: hda: cs35l41: Move external boost handling to lib for ASoC use (bsc#1203699).
- ALSA: hda: cs35l41: Mute the device before shutdown (bsc#1203699).
- ALSA: hda: cs35l41: Put the device into safe mode for external boost (bsc#1203699).
- ALSA: hda: cs35l41: Read Speaker Calibration data from UEFI variables (bsc#1203699).
- ALSA: hda: cs35l41: Remove Set Channel Map api from binding (bsc#1203699).
- ALSA: hda: cs35l41: Remove cs35l41_hda_reg_sequence struct (bsc#1203699).
- ALSA: hda: cs35l41: Remove suspend/resume hda hooks (bsc#1203699).
- ALSA: hda: cs35l41: Reorganize log for playback actions (bsc#1203699).
- ALSA: hda: cs35l41: Save Subsystem ID inside CS35L41 Driver (bsc#1203699).
- ALSA: hda: cs35l41: Save codec object inside component struct (bsc#1203699).
- ALSA: hda: cs35l41: Set Speaker Position for CLSA0100 Laptop (bsc#1203699).
- ALSA: hda: cs35l41: Support CLSA0101 (bsc#1203699).
- ALSA: hda: cs35l41: Support Firmware switching and reloading (bsc#1203699).
- ALSA: hda: cs35l41: Support Hibernation during Suspend (bsc#1203699).
- ALSA: hda: cs35l41: Support Speaker ID for laptops (bsc#1203699).
- ALSA: hda: cs35l41: Support System Suspend (bsc#1203699).
- ALSA: hda: cs35l41: Support multiple load paths for firmware (bsc#1203699).
- ALSA: hda: cs35l41: Support reading subsystem id from ACPI (bsc#1203699).
- ALSA: hda: cs35l41: Tidyup code (bsc#1203699).
- ALSA: hda: cs35l41: Use the CS35L41 HDA internal define (bsc#1203699).
- ALSA: hda: cs35l41: fix double free on error in probe() (bsc#1203699).
- ALSA: hda: fix potential memleak in 'add_widget_node' (git-fixes).
- ALSA: hda: hda_cs_dsp_ctl: Add Library to support CS_DSP ALSA controls (bsc#1203699).
- ALSA: hda: hda_cs_dsp_ctl: Add apis to write the controls directly (bsc#1203699).
- ALSA: hda: hda_cs_dsp_ctl: Add fw id strings (bsc#1203699).
- ALSA: hda: hda_cs_dsp_ctl: Ensure pwr_lock is held before reading/writing controls (bsc#1203699).
- ALSA: hda: hda_cs_dsp_ctl: Minor clean and redundant code removal (bsc#1203699).
- ALSA: hda: intel-dsp-config: Add RaptorLake PCI IDs (jsc#PED-720).
- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).
- ALSA: hiface: fix repeated words in comments (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: line6: Replace sprintf() with sysfs_emit() (git-fixes).
- ALSA: line6: remove line6_set_raw declaration (git-fixes).
- ALSA: oss: Fix potential deadlock at unregistration (git-fixes).
- ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC (git-fixes).
- ALSA: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).
- ALSA: rme9652: use explicitly signed char (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 8Pre support (git-fixes).
- ALSA: scarlett2: Add support for the internal 'standalone' switch (git-fixes).
- ALSA: scarlett2: Split scarlett2_config_items[] into 3 sections (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).
- ALSA: usb-audio: Add endianness annotations (git-fixes).
- ALSA: usb-audio: Add mixer mapping for Gigabyte B450/550 Mobos (git-fixes).
- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).
- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).
- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).
- ALSA: usb-audio: Add quirk to enable Avid Mbox 3 support (git-fixes).
- ALSA: usb-audio: Add quirks for M-Audio Fast Track C400/600 (git-fixes).
- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).
- ALSA: usb-audio: Fix NULL dererence at error path (git-fixes).
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).
- ALSA: usb-audio: Fix last interface check for registration (git-fixes).
- ALSA: usb-audio: Fix potential memory leaks (git-fixes).
- ALSA: usb-audio: Fix regression with Dell Dock jack detection (bsc#1204719).
- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).
- ALSA: usb-audio: Register card at the last interface (git-fixes).
- ALSA: usb-audio: Remove redundant workaround for Roland quirk (bsc#1205111).
- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).
- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).
- ALSA: usb-audio: Turn off 'manual mode' on Dell dock (git-fixes).
- ALSA: usb-audio: Yet more regression for for the delayed card registration (bsc#1205111).
- ALSA: usb-audio: add quirk to fix Hamedal C20 disconnect issue (git-fixes).
- ALSA: usb-audio: make read-only array marker static const (git-fixes).
- ALSA: usb-audio: remove redundant assignment to variable c (git-fixes).
- ALSA: usb-audio: scarlett2: Use struct_size() helper in scarlett2_usb() (git-fixes).
- ALSA: usb/6fire: fix repeated words in comments (git-fixes).
- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).
- ARM: 9242/1: kasan: Only map modules if CONFIG_KASAN_VMALLOC=n (git-fixes).
- ARM: 9244/1: dump: Fix wrong pg_level in walk_pmd() (git-fixes).
- ARM: 9247/1: mm: set readonly for MT_MEMORY_RO with ARM_LPAE (git-fixes).
- ARM: Drop CMDLINE_* dependency on ATAGS (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).
- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).
- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).
- ARM: at91: rm9200: fix usb device clock id (git-fixes).
- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).
- ARM: decompressor: Include .data.rel.ro.local (git-fixes).
- ARM: defconfig: clean up multi_v4t and multi_v5 configs (git-fixes).
- ARM: defconfig: drop CONFIG_PTP_1588_CLOCK=y (git-fixes).
- ARM: defconfig: drop CONFIG_SERIAL_OMAP references (git-fixes).
- ARM: defconfig: drop CONFIG_USB_FSL_USB2 (git-fixes).
- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).
- ARM: dts: am335x-pcm-953: Define fixed regulators in root node (git-fixes).
- ARM: dts: am33xx: Fix MMCHS0 dma properties (git-fixes).
- ARM: dts: armada-38x: Add gpio-ranges for pin muxing (git-fixes).
- ARM: dts: ast2500-evb: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).
- ARM: dts: ast2600-evb: fix board compatible (git-fixes).
- ARM: dts: at91: sam9g20ek: enable udc vbus gpio pinctrl (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).
- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).
- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).
- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).
- ARM: dts: exynos: correct s5k6a3 reset polarity on Midas family (git-fixes).
- ARM: dts: exynos: fix polarity of VBUS GPIO of Origen (git-fixes).
- ARM: dts: fix Moxa SDIO 'compatible', remove 'sdhci' misnomer (git-fixes).
- ARM: dts: imx6dl: add missing properties for sram (git-fixes).
- ARM: dts: imx6q-prti6q: Fix ref/tcxo-clock-frequency properties (git-fixes).
- ARM: dts: imx6q: add missing properties for sram (git-fixes).
- ARM: dts: imx6qdl-gw59{10,13}: fix user pushbutton GPIO offset (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: fix spi-flash compatible (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: hook up DDC i2c bus (git-fixes).
- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).
- ARM: dts: imx6qp: add missing properties for sram (git-fixes).
- ARM: dts: imx6sl: add missing properties for sram (git-fixes).
- ARM: dts: imx6sll: add missing properties for sram (git-fixes).
- ARM: dts: imx6sx: add missing properties for sram (git-fixes).
- ARM: dts: imx6ul: add missing properties for sram (git-fixes).
- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).
- ARM: dts: imx6ul: fix csi node compatible (git-fixes).
- ARM: dts: imx6ul: fix keypad compatible (git-fixes).
- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).
- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).
- ARM: dts: imx7: Fix NAND controller size-cells (git-fixes).
- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).
- ARM: dts: imx7d-sdb: config the max pressure for tsc2046 (git-fixes).
- ARM: dts: imx: align SPI NOR node name with dtschema (git-fixes).
- ARM: dts: integrator: Tag PCI host with device_type (git-fixes).
- ARM: dts: kirkwood: lsxl: fix serial line (git-fixes).
- ARM: dts: kirkwood: lsxl: remove first ethernet port (git-fixes).
- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).
- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).
- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).
- ARM: dts: turris-omnia: Add label for wan port (git-fixes).
- ARM: dts: turris-omnia: Fix mpp26 pin name and comment (git-fixes).
- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).
- ARM: findbit: fix overflowing offset (git-fixes).
- ARM: mxs: fix memory leak in mxs_machine_init() (git-fixes).
- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).
- ASoC: Intel: bytcht_es8316: Add quirk for the Nanote UMPC-01 (git-fixes).
- ASoC: Intel: sof_sdw: add quirk variant for LAPBC710 NUC15 (git-fixes).
- ASoC: SOF: Intel: pci-tgl: add ADL-PS support (jsc#PED-720).
- ASoC: SOF: Intel: pci-tgl: add RPL-P support (jsc#PED-720).
- ASoC: SOF: Intel: pci-tgl: add RPL-S support (jsc#PED-652).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: SOF: pci: Change DMI match info to support all Chrome platforms (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: jz4725b: Fix spelling mistake 'Sourc' -> 'Source', 'Routee' -> 'Route' (git-fixes).
- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).
- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).
- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).
- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: tx-macro: fix kcontrol put (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).
- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).
- ASoC: cs35l41: Add ASP TX3/4 source to register patch (bsc#1203699).
- ASoC: cs35l41: Add bindings for CS35L41 (bsc#1203699).
- ASoC: cs35l41: Add common cs35l41 enter hibernate function (bsc#1203699).
- ASoC: cs35l41: Add cs35l51/53 IDs (bsc#1203699).
- ASoC: cs35l41: Add endianness flag in snd_soc_component_driver (bsc#1203699).
- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).
- ASoC: cs35l41: Add support for CLSA3541 ACPI device ID (bsc#1203699).
- ASoC: cs35l41: Add support for hibernate memory retention mode (bsc#1203699).
- ASoC: cs35l41: Binding fixes (bsc#1203699).
- ASoC: cs35l41: CS35L41 Boosted Smart Amplifier (bsc#1203699).
- ASoC: cs35l41: Change monitor widgets to siggens (bsc#1203699).
- ASoC: cs35l41: Combine adjacent register writes (bsc#1203699).
- ASoC: cs35l41: Convert tables to shared source code (bsc#1203699).
- ASoC: cs35l41: Correct DSP power down (bsc#1203699).
- ASoC: cs35l41: Correct handling of some registers in the cache (bsc#1203699).
- ASoC: cs35l41: Correct some control names (bsc#1203699).
- ASoC: cs35l41: Create shared function for boost configuration (bsc#1203699).
- ASoC: cs35l41: Create shared function for errata patches (bsc#1203699).
- ASoC: cs35l41: Create shared function for setting channels (bsc#1203699).
- ASoC: cs35l41: DSP Support (bsc#1203699).
- ASoC: cs35l41: Do not overwrite returned error code (bsc#1203699).
- ASoC: cs35l41: Do not print error when waking from hibernation (bsc#1203699).
- ASoC: cs35l41: Document CS35l41 External Boost (bsc#1203699).
- ASoC: cs35l41: Fix DSP mbox start command and global enable order (bsc#1203699).
- ASoC: cs35l41: Fix GPIO2 configuration (bsc#1203699).
- ASoC: cs35l41: Fix a bunch of trivial code formating/style issues (bsc#1203699).
- ASoC: cs35l41: Fix a shift-out-of-bounds warning found by UBSAN (bsc#1203699).
- ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t (bsc#1203699).
- ASoC: cs35l41: Fix link problem (bsc#1203699).
- ASoC: cs35l41: Fix max number of TX channels (bsc#1203699).
- ASoC: cs35l41: Fix undefined reference to core functions (bsc#1203699).
- ASoC: cs35l41: Fix use of an uninitialised variable (bsc#1203699).
- ASoC: cs35l41: Fixup the error messages (bsc#1203699).
- ASoC: cs35l41: Make cs35l41_remove() return void (bsc#1203699).
- ASoC: cs35l41: Move cs35l41 exit hibernate function into shared code (bsc#1203699).
- ASoC: cs35l41: Move cs35l41 fs errata into shared code (bsc#1203699).
- ASoC: cs35l41: Move cs35l41_otp_unpack to shared code (bsc#1203699).
- ASoC: cs35l41: Move cs35l41_set_cspl_mbox_cmd to shared code (bsc#1203699).
- ASoC: cs35l41: Move cs_dsp config struct into shared code (bsc#1203699).
- ASoC: cs35l41: Move power initializations to reg_sequence (bsc#1203699).
- ASoC: cs35l41: Read System Name from ACPI _SUB to identify firmware (bsc#1203699).
- ASoC: cs35l41: Remove incorrect comment (bsc#1203699).
- ASoC: cs35l41: Remove unnecessary param (bsc#1203699).
- ASoC: cs35l41: Set the max SPI speed for the whole device (bsc#1203699).
- ASoC: cs35l41: Support external boost (bsc#1203699).
- ASoC: cs35l41: Update handling of test key registers (bsc#1203699).
- ASoC: cs35l41: Use regmap_read_poll_timeout to wait for OTP boot (bsc#1203699).
- ASoC: cs42l42: Add control for audio slow-start switch (bsc#1203699).
- ASoC: cs42l42: Add warnings about DETECT_MODE and PLL_START (bsc#1203699).
- ASoC: cs42l42: Allow time for HP/ADC to power-up after enable (bsc#1203699).
- ASoC: cs42l42: Always enable TS_PLUG and TS_UNPLUG interrupts (bsc#1203699).
- ASoC: cs42l42: Change jack_detect_mutex to a lock of all IRQ handling (bsc#1203699).
- ASoC: cs42l42: Do not claim to support 192k (bsc#1203699).
- ASoC: cs42l42: Do not reconfigure the PLL while it is running (bsc#1203699).
- ASoC: cs42l42: Fix WARN in remove() if running without an interrupt (bsc#1203699).
- ASoC: cs42l42: Handle system suspend (bsc#1203699).
- ASoC: cs42l42: Implement Manual Type detection as fallback (bsc#1203699).
- ASoC: cs42l42: Mark OSC_SWITCH_STATUS register volatile (bsc#1203699).
- ASoC: cs42l42: Minor fix all errors reported by checkpatch.pl script (bsc#1203699).
- ASoC: cs42l42: Move CS42L42 register descriptions to general include (bsc#1203699).
- ASoC: cs42l42: Only report button state if there was a button interrupt (git-fixes).
- ASoC: cs42l42: Prevent NULL pointer deref in interrupt handler (bsc#1203699).
- ASoC: cs42l42: Remove redundant pll_divout member (bsc#1203699).
- ASoC: cs42l42: Remove redundant writes to DETECT_MODE (bsc#1203699).
- ASoC: cs42l42: Remove redundant writes to RS_PLUG/RS_UNPLUG masks (bsc#1203699).
- ASoC: cs42l42: Remove unused runtime_suspend/runtime_resume callbacks (bsc#1203699).
- ASoC: cs42l42: Report full jack status when plug is detected (bsc#1203699).
- ASoC: cs42l42: Report initial jack state (bsc#1203699).
- ASoC: cs42l42: Reset and power-down on remove() and failed probe() (bsc#1203699).
- ASoC: cs42l42: Set correct SRC MCLK (bsc#1203699).
- ASoC: cs42l42: Simplify reporting of jack unplug (bsc#1203699).
- ASoC: cs42l42: Use PLL for SCLK > 12.288MHz (bsc#1203699).
- ASoC: cs42l42: Use two thresholds and increased wait time for manual type detection (bsc#1203699).
- ASoC: cs42l42: free_irq() before powering-down on probe() fail (bsc#1203699).
- ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() (git-fixes).
- ASoC: dt-bindings: cs42l42: Convert binding to yaml (bsc#1203699).
- ASoC: eureka-tlv320: Hold reference returned from of_find_xxx API (git-fixes).
- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).
- ASoC: fsl_asrc fsl_esai fsl_sai: allow CONFIG_PM=N (git-fixes).
- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).
- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).
- ASoC: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).
- ASoC: fsl_sai: use local device pointer (git-fixes).
- ASoC: imx-audmux: Silence a clang warning (git-fixes).
- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).
- ASoC: imx-card: Fix refcount issue with of_node_put (git-fixes).
- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).
- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).
- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).
- ASoC: mchp-spdiftx: Fix clang -Wbitfield-constant-conversion (git-fixes).
- ASoC: mchp-spdiftx: remove references to mchp_i2s_caps (git-fixes).
- ASoC: mt6359: Fix refcount leak bug (git-fixes).
- ASoC: mt6359: fix tests for platform_get_irq() failure (git-fixes).
- ASoC: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe (git-fixes).
- ASoC: mt6660: Keep the pm_runtime enables before component stuff in mt6660_i2c_probe (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: nau8824: Fix semaphore unbalance at error paths (git-fixes).
- ASoC: ops: Fix bounds check for _sx controls (git-fixes).
- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- ASoC: qcom: lpass-cpu: Mark HDMI TX parity register as volatile (git-fixes).
- ASoC: qcom: lpass-cpu: mark HDMI TX registers as volatile (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: qcom: sm8250: add missing module owner (git-fixes).
- ASoC: rsnd: Add check for rsnd_mod_power_on (git-fixes).
- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).
- ASoC: rt1019: Fix the TDM settings (git-fixes).
- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).
- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).
- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).
- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).
- ASoC: sgtl5000: Reset the CHIP_CLK_CTRL reg on remove (git-fixes).
- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).
- ASoC: stm32: dfsdm: manage cb buffers cleanup (git-fixes).
- ASoC: tas2764: Allow mono streams (git-fixes).
- ASoC: tas2764: Drop conflicting set_bias_level power setting (git-fixes).
- ASoC: tas2764: Fix mute/unmute (git-fixes).
- ASoC: tas2764: Fix set_tdm_slot in case of single slot (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).
- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).
- ASoC: tas2770: Fix set_tdm_slot in case of single slot (git-fixes).
- ASoC: tas2770: Reinit regcache on reset (git-fixes).
- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).
- ASoC: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).
- ASoC: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).
- ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).
- ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).
- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).
- ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).
- ASoC: wm_adsp: Add support for 'toggle' preloaders (bsc#1203699).
- ASoC: wm_adsp: Add trace caps to speaker protection FW (bsc#1203699).
- ASoC: wm_adsp: Cancel ongoing work when removing controls (bsc#1203699).
- ASoC: wm_adsp: Compressed stream DSP memory structs should be __packed (bsc#1203699).
- ASoC: wm_adsp: Correct control read size when parsing compressed buffer (bsc#1203699).
- ASoC: wm_adsp: Expand firmware loading search options (bsc#1203699).
- ASoC: wm_adsp: Fix event for preloader (bsc#1203699).
- ASoC: wm_adsp: Handle optional legacy support (git-fixes).
- ASoC: wm_adsp: Introduce cs_dsp logging macros (bsc#1203699).
- ASoC: wm_adsp: Make compressed buffers optional (bsc#1203699).
- ASoC: wm_adsp: Minor clean and redundant code removal (bsc#1203699).
- ASoC: wm_adsp: Move check for control existence (bsc#1203699).
- ASoC: wm_adsp: Move check of dsp->running to better place (bsc#1203699).
- ASoC: wm_adsp: Move sys_config_size to wm_adsp (bsc#1203699).
- ASoC: wm_adsp: Pass firmware names as parameters when starting DSP core (bsc#1203699).
- ASoC: wm_adsp: Remove pointless string comparison (bsc#1203699).
- ASoC: wm_adsp: Remove the wmfw_add_ctl helper function (bsc#1203699).
- ASoC: wm_adsp: Remove use of snd_ctl_elem_type_t (bsc#1203699).
- ASoC: wm_adsp: Rename generic DSP support (bsc#1203699).
- ASoC: wm_adsp: Separate generic cs_dsp_coeff_ctl handling (bsc#1203699).
- ASoC: wm_adsp: Separate some ASoC and generic functions (bsc#1203699).
- ASoC: wm_adsp: Separate wm_adsp specifics in cs_dsp_client_ops (bsc#1203699).
- ASoC: wm_adsp: Split DSP power operations into helper functions (bsc#1203699).
- ASoC: wm_adsp: Split out struct cs_dsp from struct wm_adsp (bsc#1203699).
- ASoC: wm_adsp: Switch to using wm_coeff_read_ctrl for compressed buffers (bsc#1203699).
- ASoC: wm_adsp: move firmware loading to client (bsc#1203699).
- ASoC: wm_adsp: remove a repeated including (bsc#1203699).
- ASoC: wm_adsp: wm_adsp_control_add() error: uninitialized symbol 'ret' (bsc#1203699).
- Bluetooth: 6LoWPAN: add missing hci_dev_put() in get_l2cap_conn() (git-fixes).
- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).
- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).
- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).
- Bluetooth: Fix not cleanup led when bt_init fails (git-fixes).
- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (git-fixes).
- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).
- Bluetooth: L2CAP: Fix user-after-free (git-fixes).
- Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create() (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- Bluetooth: RFCOMM: Fix possible deadlock on socket shutdown/release (git-fixes).
- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).
- Bluetooth: SCO: Fix sco_send_frame returning skb->len (git-fixes).
- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).
- Bluetooth: btintel: Mark Intel controller to support LE_STATES quirk (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).
- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).
- Bluetooth: btusb: mediatek: fix WMT failure during runtime suspend (git-fixes).
- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).
- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).
- Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (git-fixes).
- Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure (git-fixes).
- Bluetooth: virtio_bt: Use skb_put to set length (git-fixes).
- Decrease the number of SMB3 smbdirect client SGEs (bsc#1193629).
- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).
- Documentation: PM: Drop pme_interrupt reference (git-fixes).
- Documentation: add description for net.core.gro_normal_batch (git-fixes).
- Documentation: add description for net.sctp.ecn_enable (git-fixes).
- Documentation: add description for net.sctp.intl_enable (git-fixes).
- Documentation: add description for net.sctp.reconf_enable (git-fixes).
- Documentation: devres: add missing I2C helper (git-fixes).
- Documentation: dm writecache: Render status list as list (git-fixes).
- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).
- Documentation: fix udp_wmem_min in ip-sysctl.rst (git-fixes).
- Documentation: move watch_queue to core-api (git-fixes).
- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).
- Drivers: hv: Always reserve framebuffer region for Gen1 VMs (git-fixes).
- Drivers: hv: Fix syntax errors in comments (git-fixes).
- Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region (git-fixes).
- Drivers: hv: fix repeated words in comments (git-fixes).
- Drivers: hv: remove duplicate word in a comment (git-fixes).
- Drivers: hv: vmbus: Accept hv_sock offers in isolated guests (git-fixes).
- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).
- Drivers: hv: vmbus: Do not wait for the ACPI device upon initialization (git-fixes).
- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).
- Drivers: hv: vmbus: Fix kernel-doc (git-fixes).
- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).
- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).
- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).
- Drivers: hv: vmbus: Optimize vmbus_on_event (git-fixes).
- Drivers: hv: vmbus: Release cpu lock in error case (git-fixes).
- Drivers: hv: vmbus: Use PCI_VENDOR_ID_MICROSOFT for better discoverability (git-fixes).
- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).
- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).
- Drivers: hv: vmbus: fix typo in comment (git-fixes).
- EDAC/dmc520: Do not print an error for each unconfigured interrupt line (bsc#1190497).
- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).
- Enable livepatching related packages on -RT (jsc#PED-1706)
- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).
- HID: add Lenovo Yoga C630 battery quirk (git-fixes).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: amd_sfh: Add NULL check for hid device (git-fixes).
- HID: amd_sfh: Handle condition of 'no sensors' (git-fixes).
- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).
- HID: core: fix shift-out-of-bounds in hid_report_raw_event (git-fixes).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- HID: hid-input: add Surface Go battery quirk (git-fixes).
- HID: hid-lg4ff: Add check for empty lbuf (git-fixes).
- HID: hidraw: fix memory leak in hidraw_release() (git-fixes).
- HID: hyperv: fix possible memory leak in mousevsc_probe() (git-fixes).
- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).
- HID: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).
- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).
- HID: multitouch: Add memory barriers (git-fixes).
- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).
- HID: playstation: add initial DualSense Edge controller support (git-fixes).
- HID: roccat: Fix use-after-free in roccat_read() (git-fixes).
- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).
- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).
- HID: usbhid: Add ALWAYS_POLL quirk for some mice (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- HSI: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).
- HSI: omap_ssi_port: Fix dma_map_sg error check (git-fixes).
- Handle variable number of SGEs in client smbdirect send (bsc#1193629).
- IB/core: Fix a nested dead lock as part of ODP flow (git-fixes)
- IB/hfi1: Correctly move list in sc_disable() (git-fixes)
- IB/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes)
- IB: Set IOVA/LENGTH on IB_MR in core/uverbs layers (git-fixes)
- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).
- Input: goodix - add compatible string for GT1158 (git-fixes).
- Input: goodix - add support for GT1158 (git-fixes).
- Input: goodix - try resetting the controller when no config is set (git-fixes).
- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).
- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).
- Input: i8042 - fix leaking of platform device on module removal (git-fixes).
- Input: i8042 - fix refount leak on sparc (git-fixes).
- Input: i8042 - merge quirk tables (git-fies).
- Input: i8042 - move __initconst to fix code styling warning (git-fies).
- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).
- Input: iforce - invert valid length check when fetching device IDs (git-fixes).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: iqs62x-keys - drop unused device node references (git-fixes).
- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).
- Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).
- Input: soc_button_array - add Acer Switch V 10 to dmi_use_low_level_irq[] (git-fixes).
- Input: soc_button_array - add use_low_level_irq module parameter (git-fixes).
- Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode (git-fixes).
- Input: synaptics-rmi4 - fix firmware update operations with bootloader v8 (git-fixes).
- Input: xpad - add supported devices as contributed on github (git-fixes).
- Input: xpad - fix wireless 360 controller breaking after suspend (git-fixes).
- KABI: cgroup: Restore KABI of css_set (bsc#1201610).
- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).
- KVM-x86-Avoid-theoretical-NULL-pointer-dereference-i.patch
- KVM-x86-Check-lapic_in_kernel-before-attempting-to-s.patch
- KVM-x86-Forbid-VMM-to-set-SYNIC-STIMER-MSRs-when-Syn.patch
- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).
- KVM: MMU: shadow nested paging does not have PKU (git-fixes).
- KVM: Move wiping of the kvm->vcpus array to common code (git-fixes).
- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).
- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: SEV: Mark nested locking of vcpu->lock (git-fixes).
- KVM: SVM: Create a separate mapping for the GHCB save area (jsc#SLE-19924, jsc#SLE-24814).
- KVM: SVM: Create a separate mapping for the SEV-ES save area (jsc#SLE-19924, jsc#SLE-24814).
- KVM: SVM: Define sev_features and VMPL field in the VMSA (jsc#SLE-19924, jsc#SLE-24814).
- KVM: SVM: Disable SEV-ES support if MMIO caching is disable (git-fixes).
- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).
- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).
- KVM: SVM: Exit to userspace on ENOMEM/EFAULT GHCB errors (git-fixes).
- KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is supported (git-fixes).
- KVM: SVM: Unwind 'speculative' RIP advancement if INTn injection 'fails' (git-fixes).
- KVM: SVM: Update the SEV-ES save area mapping (jsc#SLE-19924, jsc#SLE-24814).
- KVM: SVM: adjust register allocation for __svm_vcpu_run() (git-fixes).
- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).
- KVM: SVM: fix tsc scaling cache logic (bsc#1203263).
- KVM: SVM: move guest vmsave/vmload back to assembly (git-fixes).
- KVM: SVM: replace regs argument of __svm_vcpu_run() with vcpu_svm (git-fixes).
- KVM: SVM: retrieve VMCB from assembly (git-fixes).
- KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL (git-fixes).
- KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS (git-fixes).
- KVM: VMX: Heed the 'msr' argument in msr_write_intercepted() (git-fixes).
- KVM: VMX: Inject #PF on ENCLS as 'emulated' #PF (git-fixes).
- KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there's no vPMU (git-fixes).
- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).
- KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled (bsc#1205007).
- KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable (git-fixes).
- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).
- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).
- KVM: X86: Fix when shadow_root_level=5 && guest root_level<4 (git-fixes).
- KVM: X86: Use vcpu->arch.walk_mmu for kvm_mmu_invlpg() (git-fixes).
- KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: fix avic_set_running for preemptable kernels (git-fixes).
- KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1 (git-fixes).
- KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists (git-fixes).
- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).
- KVM: nVMX: Ignore SIPI that arrives in L2 when vCPU is not in WFS (git-fixes).
- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}() (git-fixes).
- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).
- KVM: nVMX: Unconditionally purge queued/injected events on nested 'exit' (git-fixes).
- KVM: nVMX: do not use vcpu->arch.efer when checking host state on nested state load (git-fixes).
- KVM: s390: Add a routine for setting userspace CPU state (git-fixes jsc#PED-611).
- KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).
- KVM: s390: Simplify SIGP Set Arch handling (git-fixes jsc#PED-611).
- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).
- KVM: s390: pv: do not present the ecall interrupt twice (bsc#1203229 LTC#199905).
- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).
- KVM: s390x: fix SCK locking (git-fixes).
- KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE (git-fixes).
- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).
- KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes).
- KVM: x86/mmu: Do not advance iterator after restart due to yielding (git-fixes).
- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).
- KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap (git-fixes).
- KVM: x86/mmu: Move 'invalid' check out of kvm_tdp_mmu_get_root() (git-fixes).
- KVM: x86/mmu: Retry page fault if root is invalidated by memslot update (git-fixes).
- KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non-atomic path (git-fixes).
- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).
- KVM: x86/mmu: fix memoryleak in kvm_mmu_vendor_module_init() (git-fixes).
- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).
- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).
- KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}() (git-fixes).
- KVM: x86/pmu: Do not truncate the PerfEvtSeln MSR when creating a perf event (git-fixes).
- KVM: x86/pmu: Fix and isolate TSX-specific performance event logic (git-fixes).
- KVM: x86/pmu: Fix available_event_types check for REF_CPU_CYCLES event (git-fixes).
- KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).
- KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog (git-fixes).
- KVM: x86/pmu: Use different raw event masks for AMD and Intel (git-fixes).
- KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id (git-fixes).
- KVM: x86: Add KVM_CAP_ENABLE_CAP to x86 (git-fixes).
- KVM: x86: Add compat handler for KVM_X86_SET_MSR_FILTER (git-fixes).
- KVM: x86: Always set kvm_run->if_flag (git-fixes).
- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).
- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).
- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated (git-fixes).
- KVM: x86: Forcibly leave nested virt when SMM state is toggled (git-fixes).
- KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op() (git-fixes).
- KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest (git-fixes).
- KVM: x86: Inject #UD on emulated XSETBV if XSAVES isn't enabled (git-fixes).
- KVM: x86: Keep MSR_IA32_XSS unchanged for INIT (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.80000001H (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.80000006H (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.80000008H (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.8000001AH (git-fixes).
- KVM: x86: Move lookup of indexed CPUID leafs to helper (jsc#SLE-19924, jsc#SLE-24814).
- KVM: x86: Register perf callbacks after calling vendor's hardware_setup() (git-fixes).
- KVM: x86: Report error when setting CPUID if Hyper-V allocation fails (git-fixes).
- KVM: x86: Retry page fault if MMU reload is pending and root has no sp (bsc#1205744).
- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS) (git-fixes).
- KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time (git-fixes).
- KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1) (git-fixes).
- KVM: x86: Update vPMCs when retiring branch instructions (git-fixes).
- KVM: x86: Update vPMCs when retiring instructions (git-fixes).
- KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses (git-fixes).
- KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits (git-fixes).
- KVM: x86: avoid loading a vCPU after .vm_destroy was called (git-fixes).
- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).
- KVM: x86: do not report preemption if the steal time cache is stale (git-fixes).
- KVM: x86: emulator: em_sysexit should update ctxt->mode (git-fixes).
- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).
- KVM: x86: emulator: update the emulation mode after CR0 write (git-fixes).
- KVM: x86: emulator: update the emulation mode after rsm (git-fixes).
- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb() (git-fixes).
- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_send_ipi() (git-fixes).
- KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercall (git-fixes).
- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).
- KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSM (git-fixes).
- KVM: x86: nSVM: fix potential NULL derefernce on nested migration (git-fixes).
- KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved state (git-fixes).
- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).
- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).
- KVM: x86: use a separate asm-offsets.c file (git-fixes).
- MIPS: Loongson: Use hwmon_device_register_with_groups() to register hwmon (git-fixes).
- NFC: nci: Bounds check struct nfc_target arrays (git-fixes).
- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).
- NFS: Fix WARN_ON due to unionization of nfs_inode.nrequests (git-fixes).
- NFS: Fix another fsync() issue after a server reboot (git-fixes).
- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Clean up the show_nf_flags() macro (git-fixes).
- NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (git-fixes).
- NFSD: Fix ia_size underflow (git-fixes).
- NFSD: Fix offset type in I/O trace points (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NFSD: restore EINVAL error translation in nfsd_commit() (git-fixes).
- NFSv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).
- NFSv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).
- NFSv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).
- NFSv4.2 fix problems with __nfs42_ssc_open (git-fixes).
- NFSv4.2: Update mode bits after ALLOCATE and DEALLOCATE (git-fixes).
- NFSv4: Fix races in the legacy idmapper upcall (git-fixes).
- NFSv4: Fixes for nfs4_inode_return_delegation() (git-fixes).
- NFSv4: Turn off open-by-filehandle and NFS re-export for NFSv4.0 (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI/AER: Iterate over error counters instead of error strings (git-fixes).
- PCI/ASPM: Correct LTR_L1.2_THRESHOLD computation (git-fixes).
- PCI/ASPM: Ignore L1 PM Substates if device lacks capability (git-fixes).
- PCI/ASPM: Make Intel DG2 L1 acceptable latency unlimited (jsc#PED-387).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: Correct misspelled words (git-fixes).
- PCI: Disable MSI for Tegra234 Root Ports (git-fixes).
- PCI: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes).
- PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h (git-fixes).
- PCI: Prefer 'unsigned int' over bare 'unsigned' (git-fixes).
- PCI: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes).
- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).
- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).
- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).
- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).
- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (git-fixes).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).
- PCI: mediatek-gen3: Change driver name to mtk-pcie-gen3 (git-fixes).
- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).
- PM: domains: Fix handling of unavailable/disabled idle states (git-fixes).
- PM: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).
- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).
- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)
- RDMA/cm: Use SLID in the work completion as the DLID in responder side (git-fixes)
- RDMA/cma: Fix arguments order in net device validation (git-fixes)
- RDMA/cma: Use output interface for net_dev check (git-fixes)
- RDMA/core: Fix null-ptr-deref in ib_core_cleanup() (git-fixes)
- RDMA/hfi1: Fix potential integer multiplication overflow errors (git-fixes)
- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)
- RDMA/hfi1: Prevent use of lock before it is initialized (git-fixes)
- RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (git-fixes)
- RDMA/hns: Add the detection for CMDQ status in the device initialization process (git-fixes)
- RDMA/hns: Correct the type of variables participating in the shift operation (git-fixes)
- RDMA/hns: Disable local invalidate operation (git-fixes)
- RDMA/hns: Fix incorrect clearing of interrupt status register (git-fixes)
- RDMA/hns: Fix supported page size (git-fixes)
- RDMA/hns: Fix wrong fixed value of qp->rq.wqe_shift (git-fixes)
- RDMA/hns: Remove magic number (git-fixes)
- RDMA/hns: Remove the num_cqc_timer variable (git-fixes)
- RDMA/hns: Remove the num_qpc_timer variable (git-fixes)
- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)
- RDMA/hns: Replace tab with space in the right-side comments (git-fixes)
- RDMA/hns: Use hr_reg_xxx() instead of remaining roce_set_xxx() (git-fixes)
- RDMA/irdma: Add support for address handle re-use (git-fixes)
- RDMA/irdma: Align AE id codes to correct flush code and event (git-fixes)
- RDMA/irdma: Do not advertise 1GB page size for x722 (git-fixes)
- RDMA/irdma: Fix VLAN connection with wildcard address (git-fixes)
- RDMA/irdma: Fix a window for use-after-free (git-fixes)
- RDMA/irdma: Fix deadlock in irdma_cleanup_cm_core() (git-fixes)
- RDMA/irdma: Fix setting of QP context err_rq_idx_valid field (git-fixes)
- RDMA/irdma: Fix sleep from invalid context BUG (git-fixes)
- RDMA/irdma: Move union irdma_sockaddr to header file (git-fixes)
- RDMA/irdma: Remove the unnecessary variable saddr (git-fixes)
- RDMA/irdma: Report RNR NAK generation in device caps (git-fixes)
- RDMA/irdma: Report the correct max cqes from query device (git-fixes)
- RDMA/irdma: Return correct WC error for bind operation failure (git-fixes)
- RDMA/irdma: Return error on MR deregister CQP failure (git-fixes)
- RDMA/irdma: Use net_type to check network type (git-fixes)
- RDMA/irdma: Use s/g array in post send only when its valid (git-fixes)
- RDMA/irdma: Validate udata inlen and outlen (git-fixes)
- RDMA/mlx5: Add missing check for return value in get namespace flow (git-fixes)
- RDMA/mlx5: Do not compare mkey tags in DEVX indirect mkey (git-fixes)
- RDMA/mlx5: Set local port to one when accessing counters (git-fixes)
- RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)
- RDMA/qedr: Fix reporting QP timeout attribute (git-fixes)
- RDMA/qedr: clean up work queue on failure in qedr_alloc_resources() (git-fixes)
- RDMA/rtrs-clt: Use the right sg_cnt after ib_dma_map_sg (git-fixes)
- RDMA/rtrs-srv: Fix modinfo output for stringify (git-fixes)
- RDMA/rxe: Fix 'kernel NULL pointer dereference' error (git-fixes)
- RDMA/rxe: Fix deadlock in rxe_do_local_ops() (git-fixes)
- RDMA/rxe: Fix error unwind in rxe_create_qp() (git-fixes)
- RDMA/rxe: Fix mw bind to allow any consumer key portion (git-fixes)
- RDMA/rxe: Fix resize_finish() in rxe_queue.c (git-fixes)
- RDMA/rxe: Fix rnr retry behavior (git-fixes)
- RDMA/rxe: Fix the error caused by qp->sk (git-fixes)
- RDMA/rxe: For invalidate compare according to set keys in mr (git-fixes)
- RDMA/rxe: Generate a completion for unsupported/invalid opcode (git-fixes)
- RDMA/rxe: Limit the number of calls to each tasklet (git-fixes)
- RDMA/rxe: Remove useless pkt parameters (git-fixes)
- RDMA/siw: Always consume all skbuf data in sk_data_ready() upcall. (git-fixes)
- RDMA/siw: Fix QP destroy to wait for all references dropped. (git-fixes)
- RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event (git-fixes)
- RDMA/siw: Pass a pointer to virt_to_page() (git-fixes)
- RDMA/srp: Fix srp_abort() (git-fixes)
- RDMA/srp: Handle dev_set_name() failure (git-fixes)
- RDMA/srp: Rework the srp_add_port() error path (git-fixes)
- RDMA/srp: Set scmnd->result only when scmnd is not NULL (git-fixes)
- RDMA/srp: Support more than 255 rdma ports (git-fixes)
- RDMA/srp: Use the attribute group mechanism for sysfs attributes (git-fixes)
- RDMA/srpt: Duplicate port name members (git-fixes)
- RDMA/srpt: Fix a use-after-free (git-fixes)
- RDMA/srpt: Introduce a reference count in struct srpt_device (git-fixes)
- RDMA/usnic: fix set-but-not-unused variable 'flags' warning (git-fixes)
- RDMA: remove useless condition in siw_create_cq() (git-fixes)
- Reduce client smbdirect max receive segment size (bsc#1193629).
- Refresh nvme in-band authentication patches (bsc#1199086)
- Refresh patches.suse/iommu-vt-d-Acquiring-lock-in-domain-ID-allocation-helpers Fix spin deadlock in intel_iommu (bsc#1203505)
- Refresh patches.suse/iwlwifi-module-firmware-ucode-fix.patch (bsc#1202131) Now iwlwifi queries *-72.ucode, but again, this is non-existing version. Correct to the existing *-71.ucode
- Refresh patches.suse/ppc64-kdump-Limit-kdump-base-to-512MB.patch to upstream version.
- Remove doubly applied amdgpu patches
- Replace the in-house patch by the above upstream version, patches.suse/md-raid0-fix-buffer-overflow-at-debug-print.patch.
- Revert 'ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations' (bsc#1203699).
- Revert 'ALSA: usb-audio: Split endpoint setups for hw_params and prepare' (git-fixes).
- Revert 'SUNRPC: Remove unreachable error condition' (git-fixes).
- Revert 'arm64: Mitigate MTE issues with str{n}cmp()' (git-fixes)
- Revert 'clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops' (git-fixes).
- Revert 'constraints: increase disk space for all architectures' (bsc#1203693). This reverts commit 43a9011f904bc7328d38dc340f5e71aecb6b19ca.
- Revert 'crypto: qat - reduce size of mapped region' (git-fixes).
- Revert 'drivers/video/backlight/platform_lcd.c: add support for device tree based probe' (git-fixes).
- Revert 'drm/amdgpu: use dirty framebuffer helper' (git-fixes).
- Revert 'drm/i915: Hold reference to intel_context over life of i915_request' (git-fixes).
- Revert 'drm/udl: Kill pending URBs at suspend and disconnect' (bsc#1195917).
- Revert 'drm/vc4: hvs: Reset muxes at probe time (git-fixes).' (bsc#1202341) This reverts commit 303122d0f2160411fa1068220bc59849d848550d. The reverted change clears hardware state on the RPi4, which leaves the screen blank. Without it, the display works correctly.
- Revert 'drm: bridge: analogix/dp: add panel prepare/unprepare in suspend/resume time' (git-fixes).
- Revert 'firmware: arm_scmi: Add clock management to the SCMI power domain' (git-fixes).
- Revert 'ice: Hide bus-info in ethtool for PRs in switchdev mode' (git-fixes).
- Revert 'ipv6: Honor all IPv6 PIO Valid Lifetime values' (bsc#1202989).
- Revert 'net: phy: meson-gxl: improve link-up behavior' (git-fixes).
- Revert 'net: usb: ax88179_178a needs FLAG_SEND_ZLP' (git-fixes).
- Revert 'pNFS: nfs3_set_ds_client should set NFS_CS_NOPING' (git-fixes).
- Revert 'powerpc/rtas: Implement reentrant rtas call' (bsc#1203664 ltc#199236).
- Revert 'scripts/mod/modpost.c: permit '.cranges' secton for sh64 architecture.' (git-fixes).
- Revert 'tty: n_gsm: avoid call of sleeping functions from atomic context' (git-fixes).
- Revert 'tty: n_gsm: replace kicktimer with delayed_work' (git-fixes).
- Revert 'usb: add quirks for Lenovo OneLink+ Dock' (git-fixes).
- Revert 'usb: dwc3: disable USB core PHY management' (git-fixes).
- Revert 'usb: gadget: udc-xilinx: replace memcpy with memcpy_toio' (git-fixes).
- Revert 'usb: storage: Add quirk for Samsung Fit flash' (git-fixes).
- Revert 'workqueue: remove unused cancel_work()' (bsc#1204933).
- Revert 'x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV' (bsc#1190497).
- Revert selftest patches that have been reverted in stable-5.15.y
- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).
- SMB3: fix lease break timeout when multiple deferred close handles for the same file (bsc#1193629).
- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).
- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).
- SUNRPC: Fix NFSD's request deferral on RDMA transports (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Fix xdr_encode_bool() (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- SUNRPC: RPC level errors should set task->tk_rpc_status (git-fixes).
- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).
- USB: Fix ehci infinite suspend-resume loop issue in zhaoxin (git-fixes).
- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).
- USB: bcma: Make GPIO explicitly optional (git-fixes).
- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).
- USB: core: Fix RST error in hub.c (git-fixes).
- USB: core: Prevent nested device-reset calls (git-fixes).
- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: ch341: fix lost character on LCR updates (git-fixes).
- USB: serial: console: move mutex_unlock() before usb_serial_put() (git-fixes).
- USB: serial: cp210x: add Decagon UCA device id (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
- USB: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).
- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).
- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- USB: serial: option: add Quectel EM060K modem (git-fixes).
- USB: serial: option: add Quectel RM520N (git-fixes).
- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).
- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).
- USB: serial: option: add support for OPPO R11 diag port (git-fixes).
- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).
- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).
- USB: serial: option: remove old LARA-R6 PID (git-fixes).
- USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).
- XArray: Update the LRU list in xas_split() (git-fixes).
- add another bug reference to some hyperv changes (bsc#1205617).
- apparmor: Fix failed mount permission check error message (git-fixes).
- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).
- apparmor: fix aa_label_asxprint return check (git-fixes).
- apparmor: fix absroot causing audited secids to begin with = (git-fixes).
- apparmor: fix overlapping attachment computation (git-fixes).
- apparmor: fix quiet_denied for file rules (git-fixes).
- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).
- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).
- arcnet: fix potential memory leak in com20020_probe() (git-fixes).
- arm64/bti: Disable in kernel BTI when cross section thunks are broken (git-fixes)
- arm64/mm: Consolidate TCR_EL1 fields (git-fixes).
- arm64/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).
- arm64: Add AMPERE1 to the Spectre-BHB affected list (git-fixes).
- arm64: Do not forget syscall when starting a new thread (git-fixes).
- arm64: Fix bit-shifting UB in the MIDR_CPU_MODEL() macro (git-fixes)
- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).
- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).
- arm64: dts: imx8: correct clock order (git-fixes).
- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes).
- arm64: dts: imx8mn: Fix NAND controller size-cells (git-fixes).
- arm64: dts: imx8mp: Add snps,gfladj-refclk-lpm-sel quirk to USB nodes (git-fixes).
- arm64: dts: imx8mq-librem5: Add bq25895 as max17055's power supply (git-fixes).
- arm64: dts: juno: Add thermal critical trip points (git-fixes).
- arm64: dts: ls1088a: specify clock frequencies for the MDIO controllers (git-fixes).
- arm64: dts: ls208xa: specify clock frequencies for the MDIO controllers (git-fixes).
- arm64: dts: lx2160a: specify clock frequencies for the MDIO controllers (git-fixes).
- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).
- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).
- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).
- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).
- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).
- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).
- arm64: dts: qcom: sa8155p-adp: Specify which LDO modes are allowed (git-fixes).
- arm64: dts: qcom: sc7280: Cleanup the lpasscc node (git-fixes).
- arm64: dts: qcom: sm8150-xperia-kumano: Specify which LDO modes are allowed (git-fixes).
- arm64: dts: qcom: sm8250-xperia-edo: Specify which LDO modes are allowed (git-fixes).
- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).
- arm64: dts: qcom: sm8350-hdk: Specify which LDO modes are allowed (git-fixes).
- arm64: dts: qcom: sm8350: fix UFS PHY serdes size (git-fixes).
- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).
- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).
- arm64: dts: rockchip: Fix typo in lisense text for PX30.Core (git-fixes).
- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes).
- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes).
- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes).
- arm64: dts: rockchip: add enable-strobe-pulldown to emmc phy on nanopi4 (git-fixes).
- arm64: dts: rockchip: lower rk3399-puma-haikou SD controller clock frequency (git-fixes).
- arm64: dts: ti: k3-j7200: fix main pinmux range (git-fixes).
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).
- arm64: efi: Fix handling of misaligned runtime regions and drop warning (git-fixes).
- arm64: entry: avoid kprobe recursion (git-fixes).
- arm64: errata: Add Cortex-A510 to the repeat tlbi list (git-fixes) Enable this errata fix configuration option to arm64/default.
- arm64: errata: Add Cortex-A55 to the repeat tlbi list (git-fixes). Enable CONFIG_ARM64_ERRATUM_2441007, too
- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes) Enable CONFIG_ARM64_ERRATUM_1742098 in arm64/default
- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).
- arm64: fix rodata=full (git-fixes).
- arm64: fix rodata=full again (git-fixes)
- arm64: ftrace: fix module PLTs with mcount (git-fixes).
- arm64: kasan: Revert 'arm64: mte: reset the page tag in page->flags' (git-fixes).
- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).
- arm64: lib: Import latest version of Arm Optimized Routines' strcmp (git-fixes)
- arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored (git-fixes).
- arm64: select TRACE_IRQFLAGS_NMI_SUPPORT (git-fixes)
- arm64: set UXN on swapper page tables (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).
- arm64: tegra: Fixup SYSRAM references (git-fixes).
- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).
- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).
- arm64: topology: fix possible overflow in amu_fie_setup() (git-fixes).
- arm64: topology: move store_cpu_topology() to shared code (git-fixes).
- arm_pmu: Validate single/group leader events (git-fixes).
- asm-generic: remove a broken and needless ifdef conditional (git-fixes).
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ata: ahci-imx: Fix MODULE_ALIAS (git-fixes).
- ata: fix ata_id_has_devslp() (git-fixes).
- ata: fix ata_id_has_dipm() (git-fixes).
- ata: fix ata_id_has_ncq_autosense() (git-fixes).
- ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting() (git-fixes).
- ata: libahci_platform: Sanity check the DT child nodes number (git-fixes).
- ata: libata-core: do not issue non-internal commands once EH is pending (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- ata: libata-scsi: fix SYNCHRONIZE CACHE (16) command failure (git-fixes).
- ata: libata-scsi: simplify __ata_scsi_queuecmd() (git-fixes).
- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).
- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).
- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ath11k: Fix incorrect debug_mask mappings (git-fixes).
- ath11k: fix netdev open race (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).
- audit: fix undefined behavior in bit shift for AUDIT_BIT (git-fixes).
- ax25: Fix ax25 session cleanup problems (git-fixes).
- batman-adv: Fix hang up with small MTU hard-interface (git-fixes).
- bitfield.h: Fix 'type of reg too small for mask' test (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (git-fixes).
- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).
- blk-mq: do not create hctx debugfs dir until q->debugfs_dir is created (git-fixes).
- blk-mq: fix io hung due to missing commit_rqs (git-fixes).
- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).
- blktrace: Trace remapped requests correctly (git-fixes).
- block/rnbd-srv: Set keep_id to true after mutex_trylock (git-fixes).
- block: Do not reread partition table on exclusively open device (bsc#1190969).
- block: Fix fsync always failed if once failed (bsc#1202779).
- block: Fix wrong offset in bio_truncate() (bsc#1202780).
- block: add bio_start_io_acct_time() to control start_time (git-fixes).
- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).
- block: drop unused includes in <linux/genhd.h> (git-fixes).
- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).
- block: only mark bio as tracked if it really is tracked (bsc#1202782).
- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).
- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).
- bnx2x: fix built-in kernel driver load failure (git-fixes).
- bnx2x: fix driver load from initrd (git-fixes).
- bnxt_en: Fix bnxt_refclk_read() (git-fixes).
- bnxt_en: Fix bnxt_reinit_after_abort() code path (git-fixes).
- bnxt_en: fix livepatch query (git-fixes).
- bnxt_en: reclaim max resources if sriov enable fails (git-fixes).
- bonding: 802.3ad: fix no transmission of LACPDUs (git-fixes).
- bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers (git-fixes).
- bridge: switchdev: Fix memory leaks when changing VLAN protocol (git-fixes).
- btrfs-fix-deadlock-between-quota-enable-and-other-qu.patch: (bsc#1205521).
- btrfs: check if root is readonly while setting security xattr (bsc#1206147).
- btrfs: do not allow compression on nodatacow files (bsc#1206149).
- btrfs: export a helper for compression hard check (bsc#1206149).
- btrfs: fix processing of delayed data refs during backref walking (bsc#1206056).
- btrfs: fix processing of delayed tree block refs during backref walking (bsc#1206057).
- btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() (bsc#1203360).
- btrfs: fix space cache corruption and potential double allocations (bsc#1203361).
- btrfs: prevent subvol with swapfile from being deleted (bsc#1206035).
- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).
- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1206036).
- btrfs: send: fix failures when processing inodes with no links (bsc#1206036).
- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1206036).
- btrfs: send: fix sending link commands for existing file paths (bsc#1206036).
- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1206036).
- btrfs: send: refactor arguments of get_inode_info() (bsc#1206036).
- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1206036).
- btrfs: send: remove unused type parameter to iterate_inode_ref_t (bsc#1206036).
- btrfs: send: use boolean types for current inode status (bsc#1206036).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- bus: sunxi-rsb: Remove the shutdown callback (git-fixes).
- bus: sunxi-rsb: Support atomic transfers (git-fixes).
- ca8210: Fix crash by zero initializing data (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: af_can: fix NULL pointer dereference in can_rx_register() (git-fixes).
- can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).
- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).
- can: do not increase rx statistics when generating a CAN rx error message frame (git-fixes).
- can: do not increase rx_bytes statistics for RTR frames (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: etas_es58x: es58x_init_netdev(): free netdev when register_candev() (git-fixes).
- can: gs_usb: gs_can_open(): fix race dev->can.state condition (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: j1939: j1939_send_one(): fix missing CAN header initialization (git-fixes).
- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).
- can: j1939: transport: j1939_session_skb_drop_old(): spin_unlock_irqrestore() before kfree_skb() (git-fixes).
- can: kvaser_usb: Fix possible completions during init_completion (git-fixes).
- can: kvaser_usb: Fix use of uninitialized completion (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: fix CAN clock frequency regression (git-fixes).
- can: kvaser_usb: make use of units.h in assignment of frequency (git-fixes).
- can: kvaser_usb: replace run-time checks with struct kvaser_usb_driver_info (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).
- can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: m_can: Add check for devm_clk_get (git-fixes).
- can: m_can: fix typo prescalar -> prescaler (git-fixes).
- can: m_can: is_lec_err(): clean up LEC error handling (git-fixes).
- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (git-fixes).
- can: mcp251x: Fix race condition on receive interrupt (git-fixes).
- can: mcp251x: mcp251x_can_probe(): add missing unregister_candev() in error path (git-fixes).
- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).
- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix endianness conversion (git-fixes).
- can: mcp251xfd: mcp251xfd_register_get_dev_id(): use correct length to read dev_id (git-fixes).
- can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error path (git-fixes).
- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).
- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: rx-offload: can_rx_offload_init_queue(): fix typo (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- capabilities: fix potential memleak on error path from vfs_getxattr_alloc() (git-fixes).
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).
- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1206050).
- ceph: avoid putting the realm twice when decoding snaps fails (bsc#1206051).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).
- ceph: do not truncate file in atomic_open (bsc#1202824).
- ceph: do not update snapshot context when there is no new snapshot (bsc#1206047).
- ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1206048).
- ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1206049).
- ceph: properly handle statfs on multifs setups (bsc#1206045).
- ceph: switch netfs read ops to use rreq->inode instead of rreq->mapping->host (bsc#1206046).
- ceph: use correct index when encoding client supported features (bsc#1202822).
- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).
- cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).
- cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() (bsc#1196869).
- cgroup: Fix race condition at rebind_subsystems() (bsc#1203902).
- cgroup: Fix threadgroup_rwsem <-> cpus_read_lock() deadlock (bsc#1196869).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).
- char: tpm: Protect tpm_pm_suspend with locks (git-fixes).
- cifs: Add constructor/destructors for tcon->cfid (bsc#1193629).
- cifs: Add helper function to check smb1+ server (bsc#1193629).
- cifs: Do not access tcon->cfids->cfid directly from is_path_accessible (bsc#1193629).
- cifs: Do not use tcon->cfid directly, use the cfid we get from open_cached_dir (bsc#1193629).
- cifs: Fix connections leak when tlink setup failed (git-fixes).
- cifs: Fix memory leak on the deferred close (bsc#1193629).
- cifs: Fix memory leak when build ntlmssp negotiate blob failed (bsc#1193629).
- cifs: Fix pages array leak when writedata alloc failed in cifs_writedata_alloc() (bsc#1193629).
- cifs: Fix pages leak when writedata alloc failed in cifs_write_from_iter() (bsc#1193629).
- cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message (bsc#1193629).
- cifs: Fix wrong return value checking when GETFLAGS (git-fixes).
- cifs: Fix xid leak in cifs_copy_file_range() (bsc#1193629).
- cifs: Fix xid leak in cifs_create() (bsc#1193629).
- cifs: Fix xid leak in cifs_flock() (bsc#1193629).
- cifs: Fix xid leak in cifs_get_file_info_unix() (bsc#1193629).
- cifs: Fix xid leak in cifs_ses_add_channel() (bsc#1193629).
- cifs: Make tcon contain a wrapper structure cached_fids instead of cached_fid (bsc#1193629).
- cifs: Move cached-dir functions into a separate file (bsc#1193629).
- cifs: Replace a couple of one-element arrays with flexible-array members (bsc#1193629).
- cifs: Use after free in debug code (git-fixes).
- cifs: Use help macro to get the header preamble size (bsc#1193629).
- cifs: Use help macro to get the mid header size (bsc#1193629).
- cifs: add check for returning value of SMB2_close_init (git-fixes).
- cifs: add check for returning value of SMB2_set_info_init (git-fixes).
- cifs: add missing spinlock around tcon refcount (bsc#1193629).
- cifs: alloc_mid function should be marked as static (bsc#1193629).
- cifs: always initialize struct msghdr smb_msg completely (bsc#1193629).
- cifs: always iterate smb sessions using primary channel (bsc#1193629).
- cifs: avoid deadlocks while updating iface (bsc#1193629).
- cifs: avoid unnecessary iteration of tcp sessions (bsc#1193629).
- cifs: avoid use of global locks for high contention data (bsc#1193629).
- cifs: cache the dirents for entries in a cached directory (bsc#1193629).
- cifs: change iface_list from array to sorted linked list (bsc#1193629).
- cifs: destage dirty pages before re-reading them for cache=none (bsc#1193629).
- cifs: do not send down the destination address to sendmsg for a SOCK_STREAM (bsc#1193629).
- cifs: drop the lease for cached directories on rmdir or rename (bsc#1193629).
- cifs: during reconnect, update interface if necessary (bsc#1193629).
- cifs: enable caching of directories for which a lease is held (bsc#1193629).
- cifs: find and use the dentry for cached non-root directories also (bsc#1193629).
- cifs: fix double-fault crash during ntlmssp (bsc#1193629).
- cifs: fix lock length calculation (bsc#1193629).
- cifs: fix memory leaks in session setup (bsc#1193629).
- cifs: fix missing unlock in cifs_file_copychunk_range() (git-fixes).
- cifs: fix race condition with delayed threads (bsc#1193629).
- cifs: fix reconnect on smb3 mount types (bsc#1201427).
- cifs: fix skipping to incorrect offset in emit_cached_dirents (bsc#1193629).
- cifs: fix small mempool leak in SMB2_negotiate() (bsc#1193629).
- cifs: fix static checker warning (bsc#1193629).
- cifs: fix uninitialised var in smb2_compound_op() (bsc#1193629).
- cifs: fix use-after-free caused by invalid pointer `hostname` (bsc#1193629).
- cifs: fix use-after-free on the link name (bsc#1193629).
- cifs: fix wrong unlock before return from cifs_tree_connect() (bsc#1193629).
- cifs: improve handlecaching (bsc#1193629).
- cifs: improve symlink handling for smb2+ (bsc#1193629).
- cifs: lease key is uninitialized in smb1 paths (bsc#1193629).
- cifs: lease key is uninitialized in two additional functions when smb1 (bsc#1193629).
- cifs: list_for_each() -> list_for_each_entry() (bsc#1193629).
- cifs: misc: fix spelling typo in comment (bsc#1193629).
- cifs: move from strlcpy with unused retval to strscpy (bsc#1193629).
- cifs: periodically query network interfaces from server (bsc#1193629).
- cifs: populate empty hostnames for extra channels (bsc#1193629).
- cifs: prevent copying past input buffer boundaries (bsc#1193629).
- cifs: remove 'cifs_' prefix from init/destroy mids functions (bsc#1193629).
- cifs: remove initialization value (bsc#1193629).
- cifs: remove minor build warning (bsc#1193629).
- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1193629).
- cifs: remove remaining build warnings (bsc#1193629).
- cifs: remove some camelCase and also some static build warnings (bsc#1193629).
- cifs: remove unnecessary (void*) conversions (bsc#1193629).
- cifs: remove unnecessary locking of chan_lock while freeing session (bsc#1193629).
- cifs: remove unnecessary type castings (bsc#1193629).
- cifs: remove unused server parameter from calc_smb_size() (bsc#1193629).
- cifs: remove useless DeleteMidQEntry() (bsc#1193629).
- cifs: remove useless parameter 'is_fsctl' from SMB2_ioctl() (bsc#1193629).
- cifs: replace kfree() with kfree_sensitive() for sensitive data (bsc#1193629).
- cifs: return correct error in ->calc_signature() (bsc#1193629).
- cifs: return errors during session setup during reconnects (bsc#1193629).
- cifs: revalidate mapping when doing direct writes (bsc#1193629).
- cifs: secmech: use shash_desc directly, remove sdesc (bsc#1193629).
- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir (bsc#1193629).
- cifs: skip extra NULL byte in filenames (bsc#1193629).
- cifs: store a pointer to a fid in the cfid structure instead of the struct (bsc#1193629).
- cifs: truncate the inode and mapping when we simulate fcollapse (bsc#1193629).
- cifs: update cifs_ses::ip_addr after failover (bsc#1193629).
- cifs: update internal module number (bsc#1193629).
- cifs: use ALIGN() and round_up() macros (bsc#1193629).
- cifs: use LIST_HEAD() and list_move() to simplify code (bsc#1193629).
- cifs: when a channel is not found for server, log its connection id (bsc#1193629).
- cifs: when insecure legacy is disabled shrink amount of SMB1 code (bsc#1193629).
- clk: ast2600: BCLK comes from EPLL (git-fixes).
- clk: at91: fix the build with binutils 2.27 (git-fixes).
- clk: baikal-t1: Add SATA internal ref clock buffer (git-fixes).
- clk: baikal-t1: Add shared xGMAC ref/ptp clocks internal parent (git-fixes).
- clk: baikal-t1: Fix invalid xGMAC PTP clock divider (git-fixes).
- clk: bcm2835: Make peripheral PLLC critical (git-fixes).
- clk: bcm2835: Round UART input clock up (bsc#1188238)
- clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes).
- clk: bcm: rpi: Add support for VEC clock (bsc#1196632)
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: bcm: rpi: Prevent out-of-bounds access (git-fixes).
- clk: bcm: rpi: Use correct order for the parameters of devm_kcalloc() (git-fixes).
- clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).
- clk: imx: scu: fix memleak on platform_device_add() fails (git-fixes).
- clk: ingenic-tcu: Properly enable registers before accessing timers (git-fixes).
- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).
- clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent (git-fixes).
- clk: mediatek: reset: Fix written reset bit offset (git-fixes).
- clk: meson: Hold reference returned by of_get_parent() (git-fixes).
- clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).
- clk: qcom: apss-ipq6018: mark apcs_alias0_core_clk as critical (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver's init level (git-fixes).
- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).
- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).
- clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents (git-fixes).
- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).
- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).
- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).
- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).
- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- clk: sprd: Hold reference returned by of_get_parent() (git-fixes).
- clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).
- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).
- clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes).
- clk: vc5: Fix 5P49V6901 outputs disabling when enabling FOD (git-fixes).
- clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).
- clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate (git-fixes).
- clocksource/drivers/hyperv: add data structure for reference TSC MSR (git-fixes).
- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).
- constraints: increase disk space for all architectures References: bsc#1203693 aarch64 is already suffering. SLE15-SP5 x86_64 stats show that it is very close to the limit.
- cpufreq: intel_pstate: Handle no_turbo in frequency invariance (jsc#PED-849).
- cpufreq: intel_pstate: Support Sapphire Rapids OOB mode (jsc#PED-849).
- cpufreq: qcom: fix memory leak in error path (git-fixes).
- cpufreq: qcom: fix writes in read-only memory region (git-fixes).
- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).
- cpuidle: intel_idle: Drop redundant backslash at line end (jsc#PED-1936).
- crypto: akcipher - default implementation for setting a private key (git-fixes).
- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).
- crypto: cavium - prevent integer overflow loading firmware (git-fixes).
- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).
- crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes).
- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).
- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).
- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).
- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).
- crypto: hisilicon/sec - fix auth key size error (git-fixes).
- crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).
- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).
- crypto: inside-secure - Change swab to swab32 (git-fixes).
- crypto: inside-secure - Replace generic aes with libaes (git-fixes).
- crypto: marvell/octeontx - prevent integer overflows (git-fixes).
- crypto: qat - fix default value of WDT timer (git-fixes).
- crypto: sahara - do not sleep when in softirq (git-fixes).
- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).
- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).
- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).
- cs-dsp and serial-multi-instantiate enablement (bsc#1203699)
- device property: Check fwnode->secondary when finding properties (git-fixes).
- device property: Fix documentation for *_match_string() APIs (git-fixes).
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm btree remove: fix use after free in rebalance_children() (git-fixes).
- dm crypt: make printing of the key constant-time (git-fixes).
- dm era: commit metadata in postsuspend after worker stops (git-fixes).
- dm integrity: fix memory corruption when tag_size is less than digest size (git-fixes).
- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dm raid: fix accesses beyond end of raid member array (git-fixes).
- dm stats: add cond_resched when looping over entries (git-fixes).
- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).
- dm: fix double accounting of flush with data (git-fixes).
- dm: interlock pending dm_io and dm_wait_for_bios_completion (git-fixes).
- dm: properly fix redundant bio-based IO accounting (git-fixes).
- dm: remove unnecessary assignment statement in alloc_dev() (git-fixes).
- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).
- dm: revert partial fix for redundant bio-based IO accounting (git-fixes).
- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).
- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).
- dma-debug: make things less spammy under memory pressure (git-fixes).
- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).
- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).
- dmaengine: at_hdmac: Do not call the complete callback on device_terminate_all (git-fixes).
- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).
- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).
- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).
- dmaengine: at_hdmac: Fix concurrency over descriptor (git-fixes).
- dmaengine: at_hdmac: Fix concurrency over the active list (git-fixes).
- dmaengine: at_hdmac: Fix concurrency problems by removing atc_complete_all() (git-fixes).
- dmaengine: at_hdmac: Fix descriptor handling when issuing it to hardware (git-fixes).
- dmaengine: at_hdmac: Fix impossible condition (git-fixes).
- dmaengine: at_hdmac: Fix premature completion of desc in issue_pending (git-fixes).
- dmaengine: at_hdmac: Free the memset buf without holding the chan lock (git-fixes).
- dmaengine: at_hdmac: Protect atchan->status with the channel lock (git-fixes).
- dmaengine: at_hdmac: Start transfer for cyclic channels in issue_pending (git-fixes).
- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).
- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).
- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).
- dmaengine: hisilicon: Add multi-thread support for a DMA channel (git-fixes).
- dmaengine: hisilicon: Disable channels when unregister hisi_dma (git-fixes).
- dmaengine: hisilicon: Fix CQ head update (git-fixes).
- dmaengine: idxd: add helper for per interrupt handle drain (jsc#PED-682).
- dmaengine: idxd: add knob for enqcmds retries (jsc#PED-755).
- dmaengine: idxd: change MSIX allocation based on per wq activation (jsc#PED-664).
- dmaengine: idxd: change bandwidth token to read buffers (jsc#PED-679).
- dmaengine: idxd: create locked version of idxd_quiesce() call (jsc#PED-682).
- dmaengine: idxd: deprecate token sysfs attributes for read buffers (jsc#PED-679).
- dmaengine: idxd: embed irq_entry in idxd_wq struct (jsc#PED-664).
- dmaengine: idxd: fix descriptor flushing locking (jsc#PED-664).
- dmaengine: idxd: fix retry value to be constant for duration of function call (git-fixes).
- dmaengine: idxd: force wq context cleanup on device disable path (git-fixes).
- dmaengine: idxd: handle interrupt handle revoked event (jsc#PED-682).
- dmaengine: idxd: handle invalid interrupt handle descriptors (jsc#PED-682).
- dmaengine: idxd: int handle management refactoring (jsc#PED-682).
- dmaengine: idxd: match type for retries var in idxd_enqcmds() (git-fixes).
- dmaengine: idxd: move interrupt handle assignment (jsc#PED-682).
- dmaengine: idxd: rework descriptor free path on failure (jsc#PED-682).
- dmaengine: idxd: set defaults for wq configs (jsc#PED-688).
- dmaengine: idxd: update IAA definitions for user header (jsc#PED-763).
- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).
- dmaengine: ioat: stop mod_timer from resurrecting deleted timer in __cleanup() (git-fixes).
- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).
- dmaengine: mxs: use platform_driver_register (git-fixes).
- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).
- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).
- dmaengine: ti: k3-udma-glue: fix memory leak when register device fail (git-fixes).
- dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() (git-fixes).
- dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow (git-fixes).
- dmaengine: xilinx_dma: Fix devm_platform_ioremap_resource error handling (git-fixes).
- dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent API failure (git-fixes).
- dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property (git-fixes).
- docs, kprobes: Fix the wrong location of Kprobes (git-fixes).
- docs/core-api: expand Fedora instructions for GCC plugins (git-fixes).
- docs/kernel-parameters: Update descriptions for 'mitigations=' param with retbleed (git-fixes).
- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).
- docs: i2c: i2c-topology: fix incorrect heading (git-fixes).
- docs: zh_CN: fix a broken reference (git-fixes).
- dpaa2-eth: fix ethtool statistics (git-fixes).
- dpaa2-eth: trace the allocated address instead of page struct (git-fixes).
- dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drivers/iio: Remove all strcpy() uses (git-fixes).
- drivers: serial: jsm: fix some leaks in probe (git-fixes).
- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).
- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).
- drm/amd/amdgpu: fixing read wrong pf2vf data in SRIOV (git-fixes).
- drm/amd/amdgpu: skip ucode loading if ucode_size == 0 (git-fixes).
- drm/amd/display: Add HUBP surface flip interrupt handler (git-fixes).
- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).
- drm/amd/display: Assume an LTTPR is always present on fixed_vs links (git-fixes).
- drm/amd/display: Avoid MPC infinite loop (git-fixes).
- drm/amd/display: Changed pipe split policy to allow for multi-display (bsc#1152472) Backporting notes: * remove changes to non-existing 201 and 31 directories
- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).
- drm/amd/display: Correct MPC split policy for DCN301 (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).
- drm/amd/display: Fix build breakage with CONFIG_DEBUG_FS=n (git-fixes).
- drm/amd/display: Fix double cursor on non-video RGB MPO (git-fixes).
- drm/amd/display: Fix pixel clock programming (git-fixes).
- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).
- drm/amd/display: Fix vblank refcount in vrr transition (git-fixes).
- drm/amd/display: For stereo keep 'FLIP_ANY_FRAME' (git-fixes).
- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).
- drm/amd/display: Limit user regamma to a valid value (git-fixes).
- drm/amd/display: Mark dml30's UseMinimumDCFCLK() as noinline for stack usage (git-fixes).
- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).
- drm/amd/display: Reduce number of arguments of dml31's CalculateFlipSchedule() (git-fixes).
- drm/amd/display: Reduce number of arguments of dml31's CalculateWatermarksAndDRAMSpeedChangeSupport() (git-fixes).
- drm/amd/display: Remove interface for periodic interrupt 1 (git-fixes).
- drm/amd/display: Reset DMCUB before HW init (git-fixes).
- drm/amd/display: Revert 'drm/amd/display: turn DPMS off on connector unplug' (git-fixes).
- drm/amd/display: avoid doing vm_init multiple time (git-fixes).
- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).
- drm/amd/display: skip audio setup when audio stream is enabled (git-fixes).
- drm/amd/display: update gamut remap if plane has changed (git-fixes).
- drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid (git-fixes).
- drm/amd/pm: disable BACO entry/exit completely on several sienna cichlid cards (git-fixes).
- drm/amd/pm: smu7_hwmgr: fix potential off-by-one overflow in 'performance_levels' (git-fixes).
- drm/amdgpu/display: change pipe policy for DCN 2.0 (git-fixes).
- drm/amdgpu/display: change pipe policy for DCN 2.1 (git-fixes).
- drm/amdgpu/gfx10: add wraparound gpu counter check for APUs as well (bsc#1152472) Backporting notes: * also fix default branch
- drm/amdgpu/gfx9: switch to golden tsc registers for renoir+ (bsc#1152472) Backporting notes: * replace IP_VERSION() with CHIP_ constants
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).
- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).
- drm/amdgpu: Move psp_xgmi_terminate call from amdgpu_xgmi_remove_device to psp_hw_fini (git-fixes).
- drm/amdgpu: Remove one duplicated ef removal (git-fixes).
- drm/amdgpu: Separate vf2pf work item init from virt data exchange (git-fixes).
- drm/amdgpu: add missing pci_disable_device() in amdgpu_pmops_runtime_resume() (git-fixes).
- drm/amdgpu: disable BACO on special BEIGE_GOBY card (git-fixes).
- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).
- drm/amdgpu: fix initial connector audio value (git-fixes).
- drm/amdgpu: fix sdma doorbell init ordering on APUs (git-fixes).
- drm/amdgpu: make sure to init common IP before gmc (git-fixes).
- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).
- drm/amdgpu: move nbio ih_doorbell_range() into ih code for vega (git-fixes).
- drm/amdgpu: move nbio sdma_doorbell_range() into sdma code for vega (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/amdgpu: set vm_update_mode=0 as default for Sienna Cichlid in SRIOV case (git-fixes).
- drm/amdgpu: use dirty framebuffer helper (git-fixes).
- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() (git-fixes).
- drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr() (git-fixes).
- drm/amdkfd: Migrate in CPU page fault use current mm (git-fixes).
- drm/amdkfd: avoid recursive lock in migrations back to RAM (git-fixes).
- drm/amdkfd: handle CPU fault on COW mapping (git-fixes).
- drm/bridge: Avoid uninitialized variable warning (git-fixes).
- drm/bridge: display-connector: implement bus fmts callbacks (git-fixes).
- drm/bridge: lt8912b: add vsync hsync (git-fixes).
- drm/bridge: lt8912b: fix corrupted image output (git-fixes).
- drm/bridge: lt8912b: set hdmi or dvi mode (git-fixes).
- drm/bridge: lt9611uxc: Cancel only driver's work (git-fixes).
- drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).
- drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).
- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/gem: Fix GEM handle release errors (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/gma500: Fix BUG: sleeping function called from invalid context errors (git-fixes).
- drm/hyperv: Add ratelimit on error message (git-fixes).
- drm/hyperv: Do not overwrite dirt_needed value set by host (git-fixes).
- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).
- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).
- drm/i915/dp: Reset frl trained flag before restarting FRL training (git-fixes).
- drm/i915/ehl: Update MOCS table for EHL (git-fixes).
- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).
- drm/i915/gt: Restrict forced preemption to the active context (git-fixes).
- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).
- drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).
- drm/i915/hdmi: convert intel_hdmi_to_dev to intel_hdmi_to_i915 (bsc#1152489) Backporting notes: * update additional patch on top
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).
- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).
- drm/i915: Implement WaEdpLinkRateDataReload (git-fixes).
- drm/i915: Reject unsupported TMDS rates on ICL+ (git-fixes).
- drm/i915: Skip wm/ddb readout for disabled pipes (git-fixes).
- drm/i915: fix null pointer dereference (git-fixes).
- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).
- drm/komeda: Fix handling of atomic commits in the atomic_commit_tail hook (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: Allow commands to be sent during video mode (git-fixes).
- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).
- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).
- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/mediatek: dsi: Add atomic {destroy,duplicate}_state, reset callbacks (git-fixes).
- drm/mediatek: dsi: Move mtk_dsi_stop() call back to mtk_dsi_poweroff() (git-fixes).
- drm/meson: Correct OSD1 global alpha value (git-fixes).
- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/meson: explicitly remove aggregate driver at module unload time (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/mipi-dsi: Detach devices when removing the host (git-fixes).
- drm/msm/dp: Silence inconsistent indent warning (git-fixes).
- drm/msm/dp: correct 1.62G link rate at dp_catalog_ctrl_config_msa() (git-fixes).
- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).
- drm/msm/dp: fix IRQ lifetime (git-fixes).
- drm/msm/dpu: Fix comment typo (git-fixes).
- drm/msm/dpu: Fix for non-visible planes (git-fixes).
- drm/msm/dpu: index dpu_kms->hw_vbif using vbif_idx (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/hdmi: Remove spurious IRQF_ONESHOT flag (git-fixes).
- drm/msm/hdmi: drop empty 'none' regulator lists (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/hdmi: fix IRQ lifetime (git-fixes).
- drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).
- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).
- drm/msm: Fix dirtyfb refcounting (git-fixes).
- drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).
- drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).
- drm/msm: fix use-after-free on probe deferral (git-fixes).
- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).
- drm/nouveau/kms/nv140-: Disable interlacing (git-fixes).
- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).
- drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc() (git-fixes).
- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).
- drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/nouveau: recognise GA103 (git-fixes).
- drm/nouveau: wait for the exclusive fence after the shared ones v2 (bsc#1152472) Backporting notes: * context changes
- drm/omap: dss: Fix refcount leak bugs (git-fixes).
- drm/panel: simple: Fix innolux_g121i1_l01 bus_format (git-fixes).
- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).
- drm/panfrost: devfreq: set opp to the recommended one to configure regulator (git-fixes).
- drm/radeon: add a force flush to delay work when radeon (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).
- drm/rockchip: dsi: Force synchronous probe (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/scheduler: quieten kernel-doc warnings (git-fixes).
- drm/shmem-helper: Add missing vunmap on error (git-fixes).
- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- drm/tegra: vic: Fix build warning when CONFIG_PM=n (git-fixes).
- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).
- drm/udl: Add parameter to set number of URBs (bsc#1195917).
- drm/udl: Add reset_resume (bsc#1195917)
- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).
- drm/udl: Drop unneeded alignment (bsc#1195917).
- drm/udl: Enable damage clipping (bsc#1195917).
- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).
- drm/udl: Fix potential URB leaks (bsc#1195917).
- drm/udl: Increase the default URB list size to 20 (bsc#1195917).
- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).
- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).
- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).
- drm/udl: Restore display mode on resume (bsc#1195917)
- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).
- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).
- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).
- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).
- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).
- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).
- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).
- drm/vc4: kms: Fix IS_ERR() vs NULL check for vc4_kms (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- drm/virtio: Check whether transferred 2D BO is shmem (git-fixes).
- drm/virtio: Unlock reservations on virtio_gpu_object_shmem_init() error (git-fixes).
- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).
- drm: Prevent drm_copy_field() to attempt copying a NULL pointer (git-fixes).
- drm: Use size_t type for len variable in drm_copy_field() (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: adv7511: fix CEC power down control register offset (git-fixes).
- drm: bridge: dw_hdmi: only trigger hotplug event on link change (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- drm: fix drm_mipi_dbi build errors (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).
- drm:pl111: Add of_node_put() when breaking out of for_each_available_child_of_node() (git-fixes).
- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).
- dt-bindings: PCI: microchip,pcie-host: fix missing clocks properties (git-fixes).
- dt-bindings: PCI: microchip,pcie-host: fix missing dma-ranges (git-fixes).
- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).
- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).
- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).
- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).
- dt-bindings: clocks: imx8mp: Add ID for usb suspend clock (git-fixes).
- dt-bindings: crypto: ti,sa2ul: drop dma-coherent property (git-fixes).
- dt-bindings: display/msm: dpu-sc7180: add missing DPU opp-table (git-fixes).
- dt-bindings: display/msm: dpu-sdm845: add missing DPU opp-table (git-fixes).
- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).
- dt-bindings: hwmon: (mr75203) fix 'intel,vm-map' property to be optional (git-fixes).
- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).
- dt-bindings: mtd: intel: lgm-nand: Fix compatible string (git-fixes).
- dt-bindings: mtd: intel: lgm-nand: Fix maximum chip select value (git-fixes).
- dt-bindings: phy: qcom,qmp-usb3-dp: fix bogus clock-cells property (git-fixes).
- dt-bindings: phy: qcom,qmp: fix bogus clock-cells property (git-fixes).
- dt-bindings: power: gpcv2: add power-domains property (git-fixes).
- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).
- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.
- dyndbg: fix module.dyndbg handling (git-fixes).
- dyndbg: fix static_branch manipulation (git-fixes).
- dyndbg: let query-modname override actual module name (git-fixes).
- e1000e: Fix TX dispatch condition (git-fixes).
- e100: Fix possible use after free in e100_xmit_prepare (git-fixes).
- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).
- efi/tpm: Pass correct address to memblock_reserve (git-fixes).
- efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).
- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).
- efi: libstub: Disable struct randomization (git-fixes).
- efi: libstub: drop pointless get_memory_map() call (git-fixes).
- efi: random: Use 'ACPI reclaim' memory for random seed (git-fixes).
- efi: random: reduce seed size to 32 bytes (git-fixes).
- erofs: fix deadlock when shrink erofs slab (git-fixes).
- eth: alx: take rtnl_lock on resume (git-fixes).
- eth: sun: cassini: remove dead code (git-fixes).
- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).
- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).
- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).
- exfat: Drop superfluous new line for error messages (bsc#1201725).
- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).
- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).
- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).
- exfat: fix referencing wrong parent directory information after renaming (git-fixes).
- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).
- exfat: use updated exfat_chain directly during renaming (git-fixes).
- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: avoid BUG_ON when creating xattrs (bsc#1205496).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).
- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).
- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769). Refresh ext4-fix-race-condition-between-ext4_write-and-ext4_.patch
- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).
- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).
- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).
- ext4: fix null-ptr-deref in '__ext4_journal_ensure_credits' (bsc#1202764).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix super block checksum incorrect after mount (bsc#1202773).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).
- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).
- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).
- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).
- fat: add ratelimit to fat*_ent_bread() (git-fixes).
- fbcon: Add option to enable legacy hardware acceleration (bsc#1152472) Backporting changes: * context fixes in other patch * update config
- fbcon: Fix accelerated fbdev scrolling while logo is still shown (bsc#1152472)
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).
- fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).
- fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).
- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).
- fec: Fix timer capture timing in `fec_ptp_enable_pps()` (git-fixes).
- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).
- firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).
- firmware: arm_scmi: Fix the asynchronous reset requests (git-fixes).
- firmware: arm_scmi: Harden accesses to the reset domains (git-fixes).
- firmware: arm_scmi: Harden accesses to the sensor domains (git-fixes).
- firmware: arm_scmi: Improve checks in the info_get operations (git-fixes).
- firmware: arm_scmi: Make Rx chan_setup fail on memory errors (git-fixes).
- firmware: arm_scmi: Suppress the driver's bind attributes (git-fixes).
- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).
- firmware: coreboot: Register bus in module init (git-fixes).
- firmware: cs_dsp: Add lockdep asserts to interface functions (bsc#1203699).
- firmware: cs_dsp: Add memory chunk helpers (bsc#1203699).
- firmware: cs_dsp: Add offset to cs_dsp read/write (bsc#1203699).
- firmware: cs_dsp: Add pre_run callback (bsc#1203699).
- firmware: cs_dsp: Add pre_stop callback (bsc#1203699).
- firmware: cs_dsp: Add support for rev 2 coefficient files (bsc#1203699).
- firmware: cs_dsp: Add version checks on coefficient loading (bsc#1203699).
- firmware: cs_dsp: Allow creation of event controls (bsc#1203699).
- firmware: cs_dsp: Clarify some kernel doc comments (bsc#1203699).
- firmware: cs_dsp: Clear core reset for cache (bsc#1203699).
- firmware: cs_dsp: Fix overrun of unterminated control name string (bsc#1203699).
- firmware: cs_dsp: Move lockdep asserts to avoid potential null pointer (bsc#1203699).
- firmware: cs_dsp: Perform NULL check in cs_dsp_coeff_write/read_ctrl (bsc#1203699).
- firmware: cs_dsp: Print messages from bin files (bsc#1203699).
- firmware: cs_dsp: add driver to support firmware loading on Cirrus Logic DSPs (bsc#1203699).
- firmware: cs_dsp: tidy includes in cs_dsp.c and cs_dsp.h (bsc#1203699).
- firmware: google: Test spinlock on panic path to avoid lockups (git-fixes).
- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- fix race between exit_itimers() and /proc/pid/timers (git-fixes).
- fm10k: Fix error handling in fm10k_init_module() (git-fixes).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- fs/binfmt_elf: Fix memory leak in load_elf_binary() (git-fixes).
- ftrace/x86: Add back ftrace_expected assignment (git-fixes).
- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).
- ftrace: Fix char print issue in print_ip_ins() (git-fixes).
- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).
- ftrace: Fix the possible incorrect kernel message (git-fixes).
- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).
- ftrace: Optimize the allocation for mcount entries (git-fixes).
- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).
- fuse: Remove the control interface for virtio-fs (bsc#1203798).
- fuse: add file_modified() to fallocate (bsc#1205332).
- fuse: fix deadlock between atomic O_TRUNC and page invalidation (bsc#1204533).
- fuse: fix readdir cache race (bsc#1205331).
- fuse: ioctl: translate ENOSYS (bsc#1203139).
- fuse: limit nsec (bsc#1203138).
- fuse: lock inode unconditionally in fuse_fallocate() (bsc#1206273).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- gcov: support GCC 12.1 and newer compilers (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: amd8111: Fix PCI device reference count leak (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: mockup: fix NULL pointer dereference when removing debugfs (git-fixes).
- gpio: mockup: remove gpio debugfs when remove device (git-fixes).
- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).
- gpio: mvebu: Fix check for pwm support on non-A8K platforms (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully (git-fixes).
- gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() (git-fixes).
- gve: Fix GFP flags when allocing pages (git-fixes).
- habanalabs/gaudi: fix shift out of bounds (git-fixes).
- habanalabs/gaudi: mask constant value before cast (git-fixes).
- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).
- hid: hid-logitech-hidpp: avoid unnecessary assignments in hidpp_connect_event (git-fixes).
- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).
- hinic: Avoid some over memory allocation (git-fixes).
- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).
- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).
- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).
- hv_sock: Add validation for untrusted Hyper-V values (git-fixes).
- hv_sock: Check hv_pkt_iter_first_raw()'s return value (git-fixes).
- hv_sock: Copy packets sent by Hyper-V out of the ring buffer (git-fixes).
- hwmon/coretemp: Handle large core ID value (git-fixes).
- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).
- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).
- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).
- hwmon: (drivetemp) Add module alias (git-fixes).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- hwmon: (gsc-hwmon) Call of_node_get() before of_find_xxx API (git-fixes).
- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).
- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).
- hwmon: (ina3221) Fix shunt sum critical calculation (git-fixes).
- hwmon: (ltc2947) fix temperature scaling (git-fixes).
- hwmon: (mr75203) enable polling for all VM channels (git-fixes).
- hwmon: (mr75203) fix VM sensor allocation when 'intel,vm-map' not defined (git-fixes).
- hwmon: (mr75203) fix multi-channel voltage reading (git-fixes).
- hwmon: (mr75203) fix voltage equation for negative source input (git-fixes).
- hwmon: (mr75203) update pvt->v_num and vm_num to the actual number of used sensors (git-fixes).
- hwmon: (pmbus/mp2888) Fix sensors readouts for MPS Multi-phase mp2888 controller (git-fixes).
- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).
- hwmon: (sht4x) do not overflow clamping operation on 32-bit platforms (git-fixes).
- hwmon: (tps23861) fix byte order in resistance register (git-fixes).
- i2c: Fix a potential use after free (git-fixes).
- i2c: acpi: Add an i2c_acpi_client_count() helper function (bsc#1203699).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: designware: Fix handling of real but unexpected device interrupts (git-fixes).
- i2c: i801: Add support for Intel Ice Lake PCH-N (jsc#PED-634).
- i2c: i801: Add support for Intel Meteor Lake-P (jsc#PED-732).
- i2c: i801: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).
- i2c: i801: Improve handling of chip-specific feature definitions (jsc#PED-634).
- i2c: i801: add lis3lv02d's I2C address for Vostro 5568 (git-fixes).
- i2c: imx: If pm_runtime_get_sync() returned 1 device access is possible (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- i2c: imx: Only DMA messages with I2C_M_DMA_SAFE flag set (git-fixes).
- i2c: mlxbf: Fix frequency calculation (git-fixes).
- i2c: mlxbf: incorrect base address passed during io write (git-fixes).
- i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() (git-fixes).
- i2c: mlxbf: support lock mechanism (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- i2c: mxs: Silence a clang warning (git-fixes).
- i2c: npcm7xx: Fix error handling in npcm_i2c_init() (git-fixes).
- i2c: npcm: Capitalize the one-line comment (git-fixes).
- i2c: npcm: Correct slave role behavior (git-fixes).
- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).
- i2c: piix4: Fix adapter not be removed in piix4_remove() (git-fixes).
- i2c: qcom-cci: Fix ordering of pm_runtime_xx and i2c_add_adapter (git-fixes).
- i2c: tegra: Allocate DMA memory for DMA engine (git-fixes).
- i2c: xiic: Add platform module alias (git-fixes).
- i40e: Fix call trace in setup_tx_descriptors (git-fixes).
- i40e: Fix dropped jumbo frames statistics (git-fixes).
- i40e: Fix to stop tx_timeout recovery if GLOBR fails (git-fixes).
- iavf: Fix adminq error handling (git-fixes).
- iavf: Fix handling of dummy receive descriptors (git-fixes).
- iavf: Fix reset error handling (git-fixes).
- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).
- ice: Allow operation with reduced device MSI-X (bsc#1201987).
- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (git-fixes).
- ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler (git-fixes).
- ice: Fix race during aux device (un)plugging (git-fixes).
- ice: Fix switchdev rules book keeping (git-fixes).
- ice: Match on all profiles in slow-path (git-fixes).
- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (git-fixes).
- ice: check (DD | EOF) bits on Rx descriptor rather than (EOP | RS) (git-fixes).
- ice: do not setup vlan for loopback VSI (git-fixes).
- ice: fix 'scheduling while atomic' on aux critical err interrupt (git-fixes).
- ice: fix crash when writing timestamp on RX rings (git-fixes).
- ice: fix possible under reporting of ethtool Tx and Rx statistics (git-fixes).
- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).
- ieee80211: change HE nominal packet padding value defines (bsc#1202131).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- ieee802154: cc2520: Fix error return code in cc2520_hw_init() (git-fixes).
- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).
- igb: Make DMA faster when CPU is active on the PCIe link (git-fixes).
- igb: fix a use-after-free issue in igb_clean_tx_ring (git-fixes).
- igb: skip phy status check where unavailable (git-fixes).
- iio: ABI: Fix wrong format of differential capacitance channel ABI (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).
- iio: accel: bma400: Reordering of header files (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).
- iio: ad7292: Prevent regulator double disable (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7923: fix channel readings for some variants (git-fixes).
- iio: adc: at91-sama5d2_adc: check return status for pressure and touch (git-fixes).
- iio: adc: at91-sama5d2_adc: disable/prepare buffer on suspend/resume (git-fixes).
- iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).
- iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq (git-fixes).
- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- iio: adc: mcp3911: use correct id bits (git-fixes).
- iio: adc: mp2629: fix potential array out of bound access (git-fixes).
- iio: adc: mp2629: fix wrong comparison of channel (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: adxl372: Fix unsafe buffer attributes (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: bmc150-accel-core: Fix unsafe buffer attributes (git-fixes).
- iio: common: ssp: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).
- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).
- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).
- iio: inkern: fix return value in devm_of_iio_channel_get_by_name() (git-fixes).
- iio: inkern: only release the device node when done with it (git-fixes).
- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).
- iio: light: tsl2583: Fix module unloading (git-fixes).
- iio: ltc2497: Fix reading conversion results (git-fixes).
- iio: magnetometer: yas530: Change data type of hard_offsets to signed (git-fixes).
- iio: ms5611: Simplify IO callback parameters (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: pressure: dps310: Refactor startup procedure (git-fixes).
- iio: pressure: dps310: Reset chip after timeout (git-fixes).
- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).
- iio: pressure: ms5611: fixed value compensation bug (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).
- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).
- iio: temperature: ltc2983: allocate iio channels once (git-fixes).
- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).
- ima: fix blocking of security.ima xattrs of unsupported algorithms (git-fixes).
- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).
- init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash (git-fixes).
- intel_idle: Add AlderLake support (jsc#PED-824).
- intel_idle: Fix SPR C6 optimization (jsc#PED-824 jsc#PED-1936).
- intel_idle: Fix the 'preferred_cstates' module parameter (jsc#PED-824 jsc#PED-1936).
- intel_idle: make SPR C1 and C1E be independent (jsc#PED-1936).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- interconnect: imx: fix max_node_id (git-fixes).
- io-wq: Remove duplicate code in io_workqueue_create() (bnc#1205113).
- io-wq: do not retry task_work creation failure on fatal conditions (bnc#1205113).
- io-wq: ensure we exit if thread group is exiting (git-fixes).
- io-wq: exclusively gate signal based exit on get_signal() return (git-fixes).
- io-wq: fix cancellation on create-worker failure (bnc#1205113).
- io-wq: fix silly logic error in io_task_work_match() (bnc#1205113).
- io_uring: add a schedule point in io_add_buffers() (git-fixes).
- io_uring: correct __must_hold annotation (git-fixes).
- io_uring: drop ctx->uring_lock before acquiring sqd->lock (git-fixes).
- io_uring: ensure IORING_REGISTER_IOWQ_MAX_WORKERS works with SQPOLL (git-fixes).
- io_uring: fix io_timeout_remove locking (git-fixes).
- io_uring: fix missing mb() before waitqueue_active (git-fixes).
- io_uring: fix missing sigmask restore in io_cqring_wait() (git-fixes).
- io_uring: fix possible poll event lost in multi shot mode (git-fixes).
- io_uring: pin SQPOLL data before unlocking ring lock (git-fixes).
- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).
- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).
- iommu/amd: Enable swiotlb in all cases (git-fixes).
- iommu/amd: Fix I/O page table memory leak (git-fixes).
- iommu/amd: Recover from event log overflow (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).
- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/dart: Add missing module owner to ops structure (git-fixes).
- iommu/dart: check return value after calling platform_get_resource() (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).
- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).
- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).
- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).
- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Do not falsely log intel_iommu is unsupported kernel option (bsc#1204947).
- iommu/vt-d: Drop stop marker messages (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).
- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).
- iommu/vt-d: Remove global g_iommus array (bsc#1200301).
- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).
- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).
- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- iommu: Fix potential use-after-free during probe (git-fixes).
- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).
- iov_iter: fix build issue due to possible type mis-match (git-fixes).
- ip: Fix data-races around sysctl_ip_fwd_update_priority (git-fixes).
- ipmi: fix initialization when workqueue allocation fails (git-fixes).
- ipv4: Fix data-races around sysctl_fib_multipath_hash_policy (git-fixes).
- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).
- irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap (git-fixes).
- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).
- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).
- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).
- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).
- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).
- iwlwifi: Add support for more BZ HWs (bsc#1202131).
- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).
- iwlwifi: BZ Family SW reset support (bsc#1202131).
- iwlwifi: Configure FW debug preset via module param (bsc#1202131).
- iwlwifi: Fix FW name for gl (bsc#1202131).
- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).
- iwlwifi: Fix syntax errors in comments (bsc#1202131).
- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).
- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).
- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).
- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).
- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).
- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).
- iwlwifi: add new Qu-Hr device (bsc#1202131).
- iwlwifi: add new ax1650 killer device (bsc#1202131).
- iwlwifi: add new device id 7F70 (bsc#1202131).
- iwlwifi: add new pci SoF with JF (bsc#1202131).
- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).
- iwlwifi: add support for BNJ HW (bsc#1202131).
- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).
- iwlwifi: add support for Bz-Z HW (bsc#1202131).
- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).
- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).
- iwlwifi: allow rate-limited error messages (bsc#1202131).
- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).
- iwlwifi: api: remove ttl field from TX command (bsc#1202131).
- iwlwifi: api: remove unused RX status bits (bsc#1202131).
- iwlwifi: avoid variable shadowing (bsc#1202131).
- iwlwifi: avoid void pointer arithmetic (bsc#1202131).
- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).
- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).
- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).
- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).
- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).
- iwlwifi: dbg: check trigger data before access (bsc#1202131).
- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).
- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).
- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).
- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).
- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).
- iwlwifi: de-const properly where needed (bsc#1202131).
- iwlwifi: debugfs: remove useless double condition (bsc#1202131).
- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).
- iwlwifi: do not use __unused as variable name (bsc#1202131).
- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).
- iwlwifi: dump CSR scratch from outer function (bsc#1202131).
- iwlwifi: dump RCM error tables (bsc#1202131).
- iwlwifi: dump both TCM error tables if present (bsc#1202131).
- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).
- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).
- iwlwifi: eeprom: clean up macros (bsc#1202131).
- iwlwifi: fix LED dependencies (bsc#1202131).
- iwlwifi: fix debug TLV parsing (bsc#1202131).
- iwlwifi: fix fw/img.c license statement (bsc#1202131).
- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).
- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).
- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).
- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).
- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).
- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).
- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).
- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).
- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).
- iwlwifi: fw: make dump_start callback void (bsc#1202131).
- iwlwifi: fw: remove dead error log code (bsc#1202131).
- iwlwifi: implement reset flow for Bz devices (bsc#1202131).
- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).
- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).
- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).
- iwlwifi: make some functions friendly to sparse (bsc#1202131).
- iwlwifi: move symbols into a separate namespace (bsc#1202131).
- iwlwifi: mvm/api: define system control command (bsc#1202131).
- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).
- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).
- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).
- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).
- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).
- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).
- iwlwifi: mvm: Do not fail if PPAG isn't supported (bsc#1202131).
- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).
- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).
- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).
- iwlwifi: mvm: Remove antenna c references (bsc#1202131).
- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).
- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).
- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).
- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).
- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).
- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).
- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).
- iwlwifi: mvm: add US/CA to TAS block list if OEM isn't allowed (bsc#1202131).
- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).
- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).
- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).
- iwlwifi: mvm: add definitions for new rate & flags (bsc#1202131).
- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).
- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).
- iwlwifi: mvm: add some missing command strings (bsc#1202131).
- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).
- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).
- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).
- iwlwifi: mvm: add support for OCE scan (bsc#1202131).
- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).
- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).
- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).
- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).
- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).
- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).
- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).
- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).
- iwlwifi: mvm: convert old rate & flags to the new format (bsc#1202131).
- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).
- iwlwifi: mvm: correctly set channel flags (bsc#1202131).
- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).
- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).
- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).
- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).
- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).
- iwlwifi: mvm: do not get address of mvm->fwrt just to dereference as a pointer (bsc#1202131).
- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).
- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).
- iwlwifi: mvm: drop too short packets silently (bsc#1202131).
- iwlwifi: mvm: extend session protection on association (bsc#1202131).
- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).
- iwlwifi: mvm: fix a stray tab (bsc#1202131).
- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).
- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).
- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).
- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).
- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).
- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).
- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).
- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).
- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).
- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).
- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).
- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).
- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).
- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).
- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).
- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).
- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).
- iwlwifi: mvm: remove card state notification code (bsc#1202131).
- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).
- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).
- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).
- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).
- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).
- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).
- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).
- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).
- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).
- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).
- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).
- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).
- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).
- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).
- iwlwifi: mvm: support RLC configuration command (bsc#1202131).
- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).
- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).
- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).
- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).
- iwlwifi: mvm: update RFI TLV (bsc#1202131).
- iwlwifi: mvm: update definitions due to new rate & flags (bsc#1202131).
- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).
- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).
- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).
- iwlwifi: nvm: Correct HE capability (bsc#1202131).
- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).
- iwlwifi: parse error tables from debug TLVs (bsc#1202131).
- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).
- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).
- iwlwifi: pcie: add support for MS devices (bsc#1202131).
- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).
- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).
- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).
- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).
- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).
- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).
- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).
- iwlwifi: pcie: remove duplicate entry (bsc#1202131).
- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).
- iwlwifi: pcie: retake ownership after reset (bsc#1202131).
- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).
- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).
- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).
- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).
- iwlwifi: pnvm: print out the version properly (bsc#1202131).
- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).
- iwlwifi: propagate (const) type qualifier (bsc#1202131).
- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).
- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).
- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).
- iwlwifi: remove contact information (bsc#1202131).
- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).
- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).
- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).
- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).
- iwlwifi: remove unused macros (bsc#1202131).
- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).
- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).
- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).
- iwlwifi: scan: Modify return value of a function (bsc#1202131).
- iwlwifi: support 4-bits in MAC step value (bsc#1202131).
- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).
- iwlwifi: support new queue allocation command (bsc#1202131).
- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).
- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).
- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).
- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).
- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).
- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).
- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).
- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).
- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).
- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).
- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).
- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).
- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).
- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).
- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).
- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).
- ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero (git-fixes).
- ixgbe: fix bcast packets Rx on VF after promisc removal (git-fixes).
- ixgbe: fix unexpected VLAN Rx in promisc mode on VF (git-fixes).
- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- kABI workaround for spi changes (bsc#1203699).
- kABI: Add back removed struct paca member (bsc#1203664 ltc#199236).
- kABI: Fix after adding trace_iterator.wait_index (git-fixes).
- kABI: Fix kABI after 'KVM: x86/pmu: Use different raw event masks for AMD and Intel' (git-fixes).
- kABI: Fix kABI after SNP-Guest backport (jsc#SLE-19924, jsc#SLE-24814).
- kABI: Fix kABI after backport Add pmc->intr to refactor kvm_perf_overflow{_intr}() (git-fixes).
- kABI: Fix kABI after backport Always set kvm_run->if_flag (git-fixes).
- kABI: Fix kABI after backport Forcibly leave nested virt when SMM state is toggled (git-fixes).
- kABI: Fix kABI after backport Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).
- kABI: fix adding another field to scsi_device (bsc#1203039).
- kABI: reintroduce a non-inline usleep_range (git-fixes).
- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).
- kabi/severities: Exclude ppc kvm
- kabi/severities: add Qlogic qed symbols
- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471
- kabi/severities: add hisilicon hns3 symbols
- kabi/severities: add microchip dsa drivers
- kabi/severities: ignore CS35L41-specific exports (bsc#1203699)
- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.
- kabi/severities: octeontx2 driver (jsc#SLE-24682)
- kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).
- kbuild: Unify options for BTF generation for vmlinux and modules (bsc#1204693).
- kbuild: disable header exports for UML in a straightforward way (git-fixes).
- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).
- kbuild: fix the modules order between drivers and libs (git-fixes).
- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).
- kbuild: remove the target in signal traps when interrupted (git-fixes).
- kbuild: rpm-pkg: fix breakage when V=1 is used (git-fixes).
- kcm: fix strp_init() order and cleanup (git-fies).
- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages
- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.
- kernfs: fix use-after-free in __kernfs_remove (git-fixes).
- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).
- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).
- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).
- kexec_file: drop weak attribute from functions (bsc#1196444).
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kselftest/arm64: Fix validatation termination record after EXTRA_CONTEXT (git-fixes).
- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).
- kselftest/vm: fix tests build with old libc (git-fixes).
- kselftest: Fix vdso_test_abi return status (git-fixes).
- kselftest: signal all child processes (git-fixes).
- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).
- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).
- landlock: Add clang-format exceptions (git-fixes).
- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).
- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).
- landlock: Create find_rule() from unmask_layers() (git-fixes).
- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).
- landlock: Fix landlock_add_rule(2) documentation (git-fixes).
- landlock: Fix same-layer rule unions (git-fixes).
- landlock: Format with clang-format (git-fixes).
- landlock: Reduce the maximum number of layers to 16 (git-fixes).
- landlock: Use square brackets around 'landlock-ruleset' (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lib/raid6/test: fix multiple definition linking error (git-fixes).
- lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall (git-fixes).
- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).
- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).
- livepatch: Add a missing newline character in klp_module_coming() (bsc#1071995).
- livepatch: fix race between fork and KLP transition (bsc#1071995).
- lkdtm: Disable return thunks in rodata.c (bsc#1190497).
- lockd: detect and reject lock arguments that overflow (git-fixes).
- lockdep: Correct lock_classes index mapping (git-fixes).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).
- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).
- loop: Check for overflow while configuring loop (git-fies).
- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).
- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).
- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).
- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).
- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).
- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).
- mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).
- mac80211: fix a memory leak where sta_info is not freed (git-fixes).
- mac80211: introduce channel switch disconnect function (bsc#1202131).
- mac80211: radiotap: Use BIT() instead of shifts (git-fixes).
- mac802154: Fix LQI recording (git-fixes).
- mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (git-fixes).
- macsec: Fix invalid error code set (git-fixes).
- macsec: add missing attribute validation for offload (git-fixes).
- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).
- macsec: clear encryption keys from the stack after setting up offload (git-fixes).
- macsec: delete new rxsc when offload fails (git-fixes).
- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).
- macsec: fix detection of RXSCs when toggling offloading (git-fixes).
- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).
- macsec: fix secy->n_rx_sc accounting (git-fixes).
- macsec: limit replay window size with XPN (git-fixes).
- macvlan: enforce a consistent minimal mtu (git-fixes).
- mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).
- mailbox: mpfs: account for mbox offsets while sending (git-fixes).
- mailbox: mpfs: fix handling of the reg property (git-fixes).
- marvell: octeontx2: build error: unknown type name 'u64' (jsc#SLE-24682).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md-raid10: fix KASAN warning (git-fixes).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).
- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).
- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).
- md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() (git-fixes).
- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).
- md: call __md_stop_writes in md_stop (git-fixes).
- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).
- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).
- media: aspeed: Fix an error handling path in aspeed_video_probe() (git-fixes).
- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).
- media: atomisp: prevent integer overflow in sh_css_set_black_frame() (git-fixes).
- media: cedrus: Fix endless loop in cedrus_h265_skip_bits() (git-fixes).
- media: cedrus: Set the platform driver data earlier (git-fixes).
- media: cedrus: h265: Fix flag name (git-fixes).
- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).
- media: coda: Add more H264 levels for CODA960 (git-fixes).
- media: coda: Fix reported H264 profile (git-fixes).
- media: cros-ec-cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).
- media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).
- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).
- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).
- media: dvb_vb2: fix possible out of bound access (git-fixes).
- media: exynos4-is: Change clk_disable to clk_disable_unprepare (git-fixes).
- media: exynos4-is: Fix PM disable depth imbalance in fimc_is_probe (git-fixes).
- media: flexcop-usb: fix endpoint type check (git-fixes).
- media: hantro: postproc: Fix motion vector space size (git-fixes).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: hevc: Embedded indexes in RPS (git-fixes).
- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).
- media: imx-jpeg: Add pm-sleep support for imx-jpeg (git-fixes).
- media: imx-jpeg: Correct some definition according specification (git-fixes).
- media: imx-jpeg: Disable slot interrupt when frame done (git-fixes).
- media: imx-jpeg: Fix potential array out of bounds in queue_setup (git-fixes).
- media: imx-jpeg: Leave a blank space before the configuration data (git-fixes).
- media: imx-jpeg: Refactor function mxc_jpeg_parse (git-fixes).
- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).
- media: ipu3-imgu: Fix NULL pointer dereference in active selection access (git-fixes).
- media: mceusb: Use new usb_control_msg_*() routines (git-fixes).
- media: mceusb: set timeout to at least timeout provided (git-fixes).
- media: meson: vdec: add missing clk_disable_unprepare on error in vdec_hevc_start() (git-fixes).
- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).
- media: platform: mtk-mdp: Fix mdp_ipi_comm structure alignment.
- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).
- media: rkisp1: Do not pass the quantization to rkisp1_csm_config() (git-fixes).
- media: rkisp1: Initialize color space on resizer sink and source pads (git-fixes).
- media: rkisp1: Use correct macro for gradient registers (git-fixes).
- media: rkisp1: Zero v4l2_subdev_format fields in when validating links (git-fixes).
- media: rkvdec: Disable H.264 error detection (git-fixes).
- media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).
- media: st-delta: Fix PM disable depth imbalance in delta_probe (git-fixes).
- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: uvcvideo: Fix memory leak in uvc_gpio_parse (git-fixes).
- media: uvcvideo: Use entity get_cur in uvc_ctrl_set (git-fixes).
- media: v4l2-compat-ioctl32.c: zero buffer passed to v4l2_compat_get_array_args() (git-fixes).
- media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes).
- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).
- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).
- media: v4l: subdev: Fail graciously when getting try data for NULL state (git-fixes).
- media: venus: dec: Handle the case where find_format fails (git-fixes).
- media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check 'interlaced' (git-fixes).
- media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes).
- media: vivid: s_fbuf: add more sanity checks (git-fixes).
- media: vivid: set num_in/outputs to 0 if not supported (git-fixes).
- media: vsp1: Fix offset calculation for plane cropping.
- media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes).
- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).
- memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings() (git-fixes).
- memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq() (git-fixes).
- mfd: fsl-imx25: Fix check for platform_get_irq() errors (git-fixes).
- mfd: intel-lpss: Add Intel Raptor Lake PCH-S PCI IDs (jsc#PED-634).
- mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_irq_init() and lp8788_irq_init() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: sm501: Add check for platform_driver_register() (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- minix: fix bug when opening a file with O_DIRECT (git-fixes).
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).
- misc: cs35l41: Remove unused pdn variable (bsc#1203699).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).
- misc: pci_endpoint_test: Aggregate params checking for xfer (git-fixes).
- misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.
- mlxsw: i2c: Fix initialization error flow (git-fixes).
- mlxsw: spectrum: Clear PTP configuration after unregistering the netdevice (git-fixes).
- mlxsw: spectrum_cnt: Reorder counter pools (git-fixes).
- mlxsw: spectrum_router: Fix IPv4 nexthop gateway indication (git-fixes).
- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).
- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after 'mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse' (git-fixes).
- mm: Fix PASID use-after-free issue (bsc#1203908).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).
- mmc: block: Add single read for 4k sector cards (git-fixes).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).
- mmc: core: Fix ambiguous TRIM and DISCARD arg (git-fixes).
- mmc: core: Fix inconsistent sd3_bus_mode at UHS-I SD voltage switch failure (git-fixes).
- mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes).
- mmc: core: Replace with already defined values for readability (git-fixes).
- mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).
- mmc: core: properly select voltage range without power cycle (git-fixes).
- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).
- mmc: hsq: Fix data stomping during mmc recovery (git-fixes).
- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).
- mmc: mmc_test: Fix removal of debugfs file (git-fixes).
- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).
- mmc: mxcmmc: Silence a clang warning (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).
- mmc: sdhci-brcmstb: Enable Clock Gating to save power (git-fixes).
- mmc: sdhci-brcmstb: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-brcmstb: Re-organize flags (git-fixes).
- mmc: sdhci-esdhc-imx: Propagate ESDHC_FLAG_HS400* only on 8bit bus (git-fixes).
- mmc: sdhci-esdhc-imx: correct CQHCI exit halt state check (git-fixes).
- mmc: sdhci-esdhc-imx: use the correct host caps for MMC_CAP_8_BIT_DATA (git-fixes).
- mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).
- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- mmc: sdhci-pci-core: Disable ES for ASUS BIOS on Jasper Lake (git-fixes).
- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).
- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).
- mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).
- mmc: sdhci-sprd: Fix no reset data and command after voltage switch (git-fixes).
- mmc: sdhci-tegra: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: sdhci_am654: 'select', not 'depends' REGMAP_MMIO (git-fixes).
- mmc: sdhci_am654: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- mmc: tmio: avoid glitches when resetting (git-fixes).
- mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes).
- mms: sdhci-esdhc-imx: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).
- module: change to print useful messages from elf_validity_check() (git-fixes).
- module: fix [e_shstrndx].sh_size=0 OOB access (git-fixes).
- msft-hv-2570-hv_netvsc-Add-support-for-XDP_REDIRECT.patch: (bsc#1199364).
- mt76: mt7615: do not update pm stats in case of error (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).
- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).
- mtd: dataflash: Add SPI ID table (git-fixes).
- mtd: devices: docg3: check the return value of devm_ioremap() in the probe (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: parsers: bcm47xxpart: Fix halfblock reads (git-fixes).
- mtd: parsers: bcm47xxpart: print correct offset on read error (git-fixes).
- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).
- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).
- mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).
- mtd: rawnand: fsl_elbc: Fix none ECC mode (git-fixes).
- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).
- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).
- mtd: rawnand: intel: Do not re-define NAND_DATA_IFACE_CHECK_ONLY (git-fixes).
- mtd: rawnand: intel: Read the chip-select line from the correct OF node (git-fixes).
- mtd: rawnand: intel: Remove undocumented compatible string (git-fixes).
- mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct() (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).
- mtd: spi-nor: intel-spi: Disable write protection only if asked (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).
- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).
- mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv (git-fixes).
- n_gsm: remove unused parameters from gsm_error() (git-fixes).
- nbd: Fix incorrect error handle when first_minor is illegal in nbd_dev_add (git-fixes).
- net/dsa/hirschmann: Add missing of_node_get() in hellcreek_led_setup() (git-fixes).
- net/ice: fix initializing the bitmap in the switch code (git-fixes).
- net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).
- net/mlx4_en: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5: CT: Fix header-rewrite re-use for tupels (git-fixes).
- net/mlx5: Drain fw_reset when removing device (git-fixes).
- net/mlx5e: Block rx-gro-hw feature in switchdev mode (git-fixes).
- net/mlx5e: Disable softirq in mlx5e_activate_rq to avoid race condition (git-fixes).
- net/mlx5e: Fix enabling sriov while tc nic rules are offloaded (git-fixes).
- net/mlx5e: Properly block HW GRO when XDP is enabled (git-fixes).
- net/mlx5e: Properly block LRO when XDP is enabled (git-fixes).
- net/mlx5e: Properly disable vlan strip on non-UL reps (git-fixes).
- net/mlx5e: Remove HW-GRO from reported features (git-fixes).
- net/mlx5e: Remove WARN_ON when trying to offload an unsupported TLS cipher/version (git-fixes).
- net/mlx5e: Ring the TX doorbell on DMA errors (git-fixes).
- net/mlx5e: TC NIC mode, fix tc chains miss table (git-fixes).
- net/mlx5e: TC, fix decap fallback to uplink when int port not supported (git-fixes).
- net/mlx5e: Update netdev features after changing XDP state (git-fixes).
- net/mlx5e: xsk: Account for XSK RQ UMRs when calculating ICOSQ size (git-fixes).
- net/qla3xxx: Fix a test in ql_reset_work() (git-fixes).
- net/smc: Avoid overwriting the copies of clcsock callback functions (git-fixes).
- net/smc: Fix an error code in smc_lgr_create() (git-fixes).
- net/smc: Fix possible access to freed memory in link clear (git-fixes).
- net/smc: Fix possible leaked pernet namespace in smc_init() (git-fixes).
- net/smc: Fix slab-out-of-bounds issue in fallback (git-fixes).
- net/smc: Fix sock leak when release after smc_shutdown() (git-fixes).
- net/smc: Forward wakeup to smc socket waitqueue after fallback (git-fixes).
- net/smc: Only save the original clcsock callback functions (git-fixes).
- net/smc: Send directly when TCP_CORK is cleared (git-fixes).
- net/smc: kABI workarounds for struct smc_link (git-fixes).
- net/smc: kABI workarounds for struct smc_sock (git-fixes).
- net/smc: send directly on setting TCP_NODELAY (git-fixes).
- net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() (git-fixes).
- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).
- net: altera: Fix refcount leak in altera_tse_mdio_create (git-fixes).
- net: asix: fix 'can't send until first packet is send' issue (git-fixes).
- net: atlantic: fix aq_vec index out of range error (git-fixes).
- net: axienet: fix RX ring refill allocation failure handling (git-fixes).
- net: axienet: reset core on initialization prior to MDIO access (git-fixes).
- net: bcmgenet: Indicate MAC is in charge of PHY PM (git-fixes).
- net: bcmgenet: Revert 'Use stronger register read/writes to assure ordering' (git-fixes).
- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).
- net: bcmgenet: hide status block before TX timestamping (git-fixes).
- net: bgmac: Fix a BUG triggered by wrong bytes_compl (git-fixes).
- net: bgmac: Fix an erroneous kfree() in bgmac_remove() (git-fixes).
- net: bgmac: support MDIO described in DT (git-fixes).
- net: bonding: fix possible NULL deref in rlb code (git-fixes).
- net: bonding: fix use-after-free after 802.3ad slave unbind (git-fixes).
- net: chelsio: cxgb4: Avoid potential negative array offset (git-fixes).
- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).
- net: dp83822: disable false carrier interrupt (git-fixes).
- net: dp83822: disable rx error interrupt (git-fixes).
- net: dsa: b53: Add SPI ID table (git-fixes).
- net: dsa: bcm_sf2: Fix Wake-on-LAN with mac_link_down() (git-fixes).
- net: dsa: bcm_sf2: force pause link settings (git-fixes).
- net: dsa: bcm_sf2_cfp: fix an incorrect NULL check on list iterator (git-fixes).
- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).
- net: dsa: felix: fix tagging protocol changes with multiple CPU ports (git-fixes).
- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).
- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).
- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).
- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).
- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).
- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).
- net: dsa: introduce helpers for iterating through ports using dp (git-fixes).
- net: dsa: ksz9477: port mirror sniffing limited to one port (git-fixes).
- net: dsa: lantiq_gswip: Do not set GSWIP_MII_CFG_RMII_CLK (git-fixes).
- net: dsa: lantiq_gswip: Fix refcount leak in gswip_gphy_fw_list (git-fixes).
- net: dsa: lantiq_gswip: fix use after free in gswip_remove() (git-fixes).
- net: dsa: microchip: fix bridging with more than two member ports (git-fixes).
- net: dsa: microchip: implement multi-bridge support (git-fixes).
- net: dsa: microchip: ksz9477: fix fdb_dump last invalid entry (git-fixes).
- net: dsa: microchip: ksz_common: Fix refcount leak bug (git-fixes).
- net: dsa: mt7530: 1G can also support 1000BASE-X link mode (git-fixes).
- net: dsa: mt7530: add missing of_node_put() in mt7530_setup() (git-fixes).
- net: dsa: mv88e6060: prevent crash on an unused port (git-fixes).
- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).
- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).
- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).
- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).
- net: dsa: mv88e6xxx: Fix port_hidden_wait to account for port_base_addr (git-fixes).
- net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (git-fixes).
- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).
- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).
- net: dsa: mv88e6xxx: Unforce speed & duplex in mac_link_down() (git-fixes).
- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).
- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).
- net: dsa: mv88e6xxx: fix 'do not use PHY_DETECT on internal PHY's' (git-fixes).
- net: dsa: mv88e6xxx: use BMSR_ANEGCOMPLETE bit for filling an_complete (git-fixes).
- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).
- net: dsa: qca8k: fix MTU calculation (git-fixes).
- net: dsa: restrict SMSC_LAN9303_I2C kconfig (git-fixes).
- net: dsa: seville: register the mdiobus under devres (git-fixes).
- net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions() (git-fixes).
- net: dsa: sja1105: silent spi_device_id warnings (git-fixes).
- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).
- net: dsa: vitesse-vsc73xx: silent spi_device_id warnings (git-fixes).
- net: emaclite: Add error handling for of_address_to_resource() (git-fixes).
- net: enetc: Use pci_release_region() to release some resources (git-fixes).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register (git-fixes).
- net: ethernet: mediatek: ppe: fix wrong size passed to memset() (git-fixes).
- net: ethernet: mv643xx: Fix over zealous checking of_get_mac_address() (git-fixes).
- net: ethernet: nixge: fix NULL dereference (git-fixes).
- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).
- net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link (git-fixes).
- net: ethernet: stmmac: fix write to sgmii_adapter_base (git-fixes).
- net: ethernet: ti: am65-cpsw: Fix devlink port register sequence (git-fixes).
- net: ethernet: ti: am65-cpsw: fix error handling in am65_cpsw_nuss_probe() (git-fixes).
- net: ethernet: ti: davinci_mdio: Add workaround for errata i2329 (git-fixes).
- net: ethernet: ti: davinci_mdio: fix build for mdio bitbang uses (git-fixes).
- net: fec: add missing of_node_put() in fec_enet_init_stop_mode() (git-fixes).
- net: fix IFF_TX_SKB_NO_LINEAR definition (git-fixes).
- net: ftgmac100: Hold reference returned by of_get_child_by_name() (git-fixes).
- net: ftgmac100: access hardware register after clock ready (git-fixes).
- net: hns3: add netdev reset check for hns3_set_tunable() (git-fixes).
- net: hns3: clean residual vf config after disable sriov (git-fixes).
- net: hns3: do not push link state to VF if unalive (git-fixes).
- net: hns3: fix the concurrency between functions reading debugfs (git-fixes).
- net: hns3: set port base vlan tbl_sta to false before removing old vlan (git-fixes).
- net: huawei: hinic: Use devm_kcalloc() instead of devm_kzalloc() (git-fixes).
- net: hyperv: remove use of bpf_op_t (git-fixes).
- net: ieee802154: return -EINVAL for unknown addr type (git-fixes).
- net: ipa: do not assume SMEM is page-aligned (git-fixes).
- net: ipa: get rid of a duplicate initialization (git-fixes).
- net: ipa: kill ipa_cmd_pipeline_clear() (git-fixes).
- net: ipa: record proper RX transaction count (git-fixes).
- net: ipvtap - add __init/__exit annotations to module init/exit funcs (git-fixes).
- net: macb: Fix PTP one step sync support (git-fixes).
- net: macb: Increment rx bd head after allocating skb and buffer (git-fixes).
- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).
- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).
- net: mana: Fix race on per-CQ variable napi work_done (git-fixes).
- net: marvell: prestera: fix incorrect structure access (git-fixes).
- net: mdio: Fix ENOMEM return value in BCM6368 mux bus controller (git-fixes).
- net: mdio: fix unbalanced fwnode reference count in mdio_device_release() (git-fixes).
- net: mdiobus: fix unbalanced node reference count (git-fixes).
- net: moxa: get rid of asymmetry in DMA mapping/unmapping (git-fixes).
- net: moxa: pass pdev instead of ndev to DMA functions (git-fixes).
- net: mscc: ocelot: avoid corrupting hardware counters when moving VCAP filters (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).
- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mscc: ocelot: fix VCAP IS2 filters matching on both lookups (git-fixes).
- net: mscc: ocelot: fix address of SYS_COUNT_TX_AGING counter (git-fixes).
- net: mscc: ocelot: fix all IP traffic getting trapped to CPU with PTP over IP (git-fixes).
- net: mscc: ocelot: fix broken IP multicast flooding (git-fixes).
- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).
- net: mscc: ocelot: fix last VCAP IS1/IS2 filter persisting in hardware when deleted (git-fixes).
- net: mscc: ocelot: fix missing unlock on error in ocelot_hwstamp_set() (git-fixes).
- net: mscc: ocelot: restrict tc-trap actions to VCAP IS2 lookup 0 (git-fixes).
- net: mscc: ocelot: set up traps for PTP packets (git-fixes).
- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).
- net: openvswitch: fix leak of nested actions (git-fixes).
- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).
- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).
- net: pcs: xpcs: propagate xpcs_read error to xpcs_get_state_c37_sgmii (git-fixes).
- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).
- net: phy: Do not WARN for PHY_UP state in mdio_bus_phy_resume() (git-fixes).
- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).
- net: phy: aquantia: wait for the suspend/resume operations to finish (git-fixes).
- net: phy: at803x: move page selection fix to config_init (git-fixes).
- net: phy: dp83822: disable MDI crossover status change interrupt (git-fixes).
- net: phy: dp83867: Extend RX strap quirk for SGMII mode (git-fixes).
- net: phy: fix null-ptr-deref while probe() failed (git-fixes).
- net: phy: marvell: add sleep time after enabling the loopback bit (git-fixes).
- net: phy: mscc: macsec: clear encryption keys when freeing a flow (git-fixes).
- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).
- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: smsc95xx: add support for Microchip EVB-LAN8670-USB (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: sparx5: depends on PTP_1588_CLOCK_OPTIONAL (git-fixes).
- net: sparx5: uses, depends on BRIDGE or !BRIDGE (git-fixes).
- net: stmmac: Fix unset max_speed difference between DT and non-DT platforms (git-fixes).
- net: stmmac: Use readl_poll_timeout_atomic() in atomic state (git-fixes).
- net: stmmac: clean up impossible condition (git-fixes).
- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).
- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).
- net: stmmac: dwmac-qcom-ethqos: Enable RGMII functional clock on resume (git-fixes).
- net: stmmac: dwmac-qcom-ethqos: add platform level clocks management (git-fixes).
- net: stmmac: dwmac-sun8i: add missing of_node_put() in sun8i_dwmac_register_mdio_mux() (git-fixes).
- net: stmmac: enhance XDP ZC driver level switching performance (git-fixes).
- net: stmmac: fix dma queue left shift overflow issue (git-fixes).
- net: stmmac: fix leaks in probe (git-fixes).
- net: stmmac: fix off-by-one error in sanity check (git-fixes).
- net: stmmac: fix out-of-bounds access in a selftest (git-fixes).
- net: stmmac: fix pm runtime issue in stmmac_dvr_remove() (git-fixes).
- net: stmmac: fix unbalanced ptp clock issue in suspend/resume flow (git-fixes).
- net: stmmac: only enable DMA interrupts when ready (git-fixes).
- net: stmmac: perserve TX and RX coalesce value during XDP setup (git-fixes).
- net: stmmac: remove redunctant disable xPCS EEE call (git-fixes).
- net: stmmac: remove unused get_addr() callback (git-fixes).
- net: stmmac: work around sporadic tx issue on link-up (git-fixes).
- net: sungem_phy: Add of_node_put() for reference returned by of_get_parent() (git-fixes).
- net: systemport: Fix an error handling path in bcm_sysport_probe() (git-fixes).
- net: tap: NULL pointer derefence in dev_parse_header_protocol when skb->dev is null (git-fixes).
- net: thunderbolt: Enable DMA paths only after rings are enabled (git-fixes).
- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).
- net: thunderbolt: fix memory leak in tbnet_open() (git-fixes).
- net: thunderx: Fix the ACPI memory leak (git-fixes).
- net: usb: Correct PHY handling of smsc95xx (git-fixes).
- net: usb: Correct reset handling of smsc95xx (git-fixes).
- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).
- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).
- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).
- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).
- net: usb: qmi_wwan: add Telit 0x103a composition (git-fixes).
- net: usb: r8152: Add in new Devices that are supported for Mac-Passthru (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net: wwan: iosm: Call mutex_init before locking it (git-fixes).
- net: wwan: iosm: fix dma_alloc_coherent incompatible pointer type (git-fixes).
- net: wwan: iosm: fix kernel test robot reported error (git-fixes).
- net: wwan: iosm: remove pointless null check (git-fixes).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- netdevsim: fib: Fix reference count leak on route deletion failure (git-fixes).
- nfc/nci: fix race with opening and closing (git-fixes).
- nfc: fdp: Fix potential memory leak in fdp_nci_send() (git-fixes).
- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).
- nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() (git-fixes).
- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).
- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).
- nfc: st-nci: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).
- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).
- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).
- nfp: ethtool: fix the display error of `ethtool -m DEVNAME` (git-fixes).
- nfsd: eliminate the NFSD_FILE_BREAK_* flags (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() (git-fixes).
- nilfs2: fix deadlock in nilfs_count_free_blocks() (git-fixes).
- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).
- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).
- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).
- nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty (git-fixes).
- nilfs2: fix use-after-free bug of ns_writer on remount (git-fixes).
- nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure (git-fixes).
- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).
- nouveau/svm: Fix to migrate all requested pages (git-fixes).
- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).
- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).
- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).
- nvme-auth: retry command if DNR bit is not set (bsc#1201675).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme: consider also host_iface when checking ip options (bsc#1199670).
- nvme: do not print verbose errors for internal passthrough requests (bsc#1202187).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvme: implement In-Band authentication (jsc#SLE-20183).
- nvme: kabi fixes for in-band authentication (bsc#1199086).
- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).
- nvmet-auth: expire authentication sessions (jsc#SLE-20183).
- nvmet: Expose max queues to configfs (bsc#1201865).
- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).
- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).
- ocfs2: fix a deadlock when commit trans (bsc#1202776).
- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).
- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).
- octeontx2-af: Add SDP interface support (jsc#SLE-24682).
- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).
- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).
- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).
- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).
- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).
- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).
- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).
- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).
- octeontx2-af: Apply tx nibble fixup always (git-fixes).
- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).
- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).
- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).
- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).
- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).
- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).
- octeontx2-af: Fix key checking for source mac (git-fixes).
- octeontx2-af: Fix mcam entry resource leak (git-fixes).
- octeontx2-af: Fix spelling mistake 'Makesure' -> 'Make sure' (jsc#SLE-24682).
- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).
- octeontx2-af: Flow control resource management (jsc#SLE-24682).
- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).
- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).
- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).
- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).
- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).
- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).
- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).
- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).
- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).
- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).
- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).
- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).
- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).
- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).
- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).
- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).
- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).
- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).
- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).
- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).
- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).
- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).
- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).
- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).
- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).
- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).
- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).
- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).
- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).
- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).
- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).
- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).
- octeontx2-af: fix array bound error (jsc#SLE-24682).
- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).
- octeontx2-af: initialize action variable (jsc#SLE-24682).
- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).
- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).
- octeontx2-af: suppress external profile loading warning (git-fixes).
- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).
- octeontx2-af: verify CQ context updates (jsc#SLE-24682).
- octeontx2-nic: fix mixed module build (jsc#SLE-24682).
- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).
- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).
- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).
- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).
- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).
- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).
- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).
- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).
- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).
- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).
- octeontx2-pf: Fix NIX_AF_TL3_TL2X_LINKX_CFG register configuration (git-fixes).
- octeontx2-pf: Fix UDP/TCP src and dst port tc filters (git-fixes).
- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).
- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).
- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).
- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).
- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).
- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).
- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).
- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).
- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).
- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).
- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).
- octeontx2-pf: cn10k: Fix egress ratelimit configuration (git-fixes).
- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).
- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).
- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).
- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).
- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).
- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).
- of/device: Fix up of_dma_configure_id() stub (git-fixes).
- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).
- openvswitch: Fix double reporting of drops in dropwatch (git-fixes).
- openvswitch: Fix overreporting of drops in dropwatch (git-fixes).
- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).
- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).
- openvswitch: add nf_ct_is_confirmed check before assigning the helper (git-fixes).
- openvswitch: always update flow key after nat (git-fixes).
- openvswitch: switch from WARN to pr_warn (git-fixes).
- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).
- overflow.h: restore __ab_c_size (git-fixes).
- overflow: Implement size_t saturating arithmetic helpers (jsc#PED-1211).
- pNFS/flexfiles: Report RDMA connection errors to the server (git-fixes).
- padata: Fix list iterator in padata_do_serial() (git-fixes).
- panic, kexec: make __crash_kexec() NMI safe (git-fixes).
- parisc/sticon: fix reverse colors (bsc#1152489)
- parisc/stifb: Fix fb_is_primary_device() only available with (bsc#1152489)
- parisc/stifb: Implement fb_is_primary_device() (bsc#1152489)
- parisc/stifb: Keep track of hardware path of graphics card (bsc#1152489)
- parport_pc: Avoid FIFO port location truncation (git-fixes).
- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).
- phy: amlogic: phy-meson-axg-mipi-pcie-analog: Hold reference returned by of_get_parent() (git-fixes).
- phy: qualcomm: call clk_disable_unprepare in the error handling (git-fixes).
- phy: ralink: mt7621-pci: add sentinel to quirks table (git-fixes).
- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).
- phy: stm32: fix an error code in probe (git-fixes).
- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).
- pinctrl: Ingenic: JZ4755 bug fixes (git-fixes).
- pinctrl: alderlake: Add Intel Alder Lake-N pin controller support (jsc#PED-676).
- pinctrl: alderlake: Add Raptor Lake-S ACPI ID (jsc#PED-634).
- pinctrl: alderlake: Fix register offsets for ADL-N variant (jsc#PED-676).
- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).
- pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).
- pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback (git-fixes).
- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).
- pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).
- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).
- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).
- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).
- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).
- pinctrl: intel: Save and restore pins in 'direct IRQ' mode (git-fixes).
- pinctrl: microchip-sgpio: Correct the fwnode_irq_get() return value check (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: qcom: sc8180x: Fix gpio_wakeirq_map (git-fixes).
- pinctrl: qcom: sc8180x: Fix wrong pin numbers (git-fixes).
- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).
- pinctrl: rockchip: list all pins in a possible mux route for PX30 (git-fixes).
- pinctrl: single: Fix potential division by zero (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- pinctrl: sunxi: Fix name for A100 R_PIO (git-fixes).
- platform/chrome: cros_ec: Always expose last resume result (git-fixes).
- platform/chrome: cros_ec: Notify the PM of wake events during resume (git-fixes).
- platform/chrome: cros_ec_proto: Update version on GET_NEXT_EVENT failure (git-fixes).
- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).
- platform/chrome: cros_ec_typec: Correct alt mode index (git-fixes).
- platform/chrome: fix double-free in chromeos_laptop_prepare() (git-fixes).
- platform/chrome: fix memory corruption in ioctl (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/surface: aggregator: Do not check for repeated unsequenced packets (git-fixes).
- platform/surface: aggregator_registry: Add support for Surface Laptop Go 2 (git-fixes).
- platform/x86/intel/pmt: Sapphire Rapids PMT errata fix (jsc#PED-2684 bsc#1205683).
- platform/x86/intel: hid: add quirk to support Surface Go 3 (git-fixes).
- platform/x86/intel: pmc: Do not unconditionally attach Intel PMC when virtualized (git-fixes).
- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).
- platform/x86: acer-wmi: Enable SW_TABLET_MODE on Switch V 10 (SW5-017) (git-fixes).
- platform/x86: asus-wmi: Document the dgpu_disable sysfs attribute (git-fixes).
- platform/x86: asus-wmi: Document the egpu_enable sysfs attribute (git-fixes).
- platform/x86: asus-wmi: Document the panel_od sysfs attribute (git-fixes).
- platform/x86: asus-wmi: add missing pci_dev_put() in asus_wmi_set_xusb2pr() (git-fixes).
- platform/x86: hp-wmi: Ignore Smart Experience App event (git-fixes).
- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).
- platform/x86: i2c-multi-instantiate: Rename it for a generic serial driver name (bsc#1203699).
- platform/x86: ideapad-laptop: Disable touchpad_switch (git-fixes).
- platform/x86: msi-laptop: Change DMI match / alias strings to fix module autoloading (git-fixes).
- platform/x86: msi-laptop: Fix old-ec check for backlight registering (git-fixes).
- platform/x86: msi-laptop: Fix resource cleanup (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).
- platform/x86: serial-multi-instantiate: Add CLSA0101 Laptop (bsc#1203699).
- platform/x86: serial-multi-instantiate: Add SPI support (bsc#1203699).
- platform/x86: serial-multi-instantiate: Reorganize I2C functions (bsc#1203699).
- platform/x86: touchscreen_dmi: Add info for the RCA Cambio W101 v2 2-in-1 (git-fixes).
- plip: avoid rcu debug splat (git-fixes).
- power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() (git-fixes).
- powerpc-pseries-mobility-set-NMI-watchdog-factor-dur.patch.
- powerpc-watchdog-introduce-a-NMI-watchdog-s-factor.patch.
- powerpc/64: Fix build failure with allyesconfig in book3s_64_entry.S (bsc#1194869).
- powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).
- powerpc/64: pcpu setup avoid reading mmu_linear_psize on 64e or radix (bsc#1204413 ltc#200176).
- powerpc/64s: Fix build failure when CONFIG_PPC_64S_HASH_MMU is not set (bsc#1204413 ltc#200176).
- powerpc/64s: Make flush_and_reload_slb a no-op when radix is enabled (bsc#1204413 ltc#200176).
- powerpc/64s: Make hash MMU support configurable (bsc#1204413 ltc#200176).
- powerpc/64s: Move and rename do_bad_slb_fault as it is not hash specific (bsc#1204413 ltc#200176).
- powerpc/64s: Move hash MMU support code under CONFIG_PPC_64S_HASH_MMU (bsc#1204413 ltc#200176).
- powerpc/64s: Rename hash_hugetlbpage.c to hugetlbpage.c (bsc#1204413 ltc#200176).
- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).
- powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc#200074).
- powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc#SLE-13847 git-fixes).
- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).
- powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).
- powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/pseries/vas: Add VAS IRQ primary handler (bsc#1204413 ltc#200176).
- powerpc/pseries/vas: Declare pseries_vas_fault_thread_fn() as static (bsc#1194869).
- powerpc/pseries/vas: Pass hw_cpu_id to node associativity HCALL (bsc#1194869).
- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: Stop selecting PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176).
- powerpc/pseries: lparcfg do not include slb_size line in radix mode (bsc#1204413 ltc#200176).
- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: Ignore DSI error caused by the copy/paste instruction (bsc#1204413 ltc#200176).
- powerpc: Rename PPC_NATIVE to PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176). Update config files.
- powerpc: make memremap_compat_align 64s-only (bsc#1204413 ltc#200176).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).
- printk: use atomic updates for klogd work (bsc#1204934).
- printk: wake waiters for safe and NMI contexts (bsc#1204934).
- proc: avoid integer type confusion in get_proc_long (git-fixes).
- proc: fix a dentry lock race between release_task and lookup (git-fixes).
- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).
- proc: proc_skip_spaces() shouldn't think it is working on C strings (git-fixes).
- profiling: fix shift too large makes kernel panic (git-fixes).
- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).
- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).
- pwm: lpc18xx: Fix period handling (git-fixes).
- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).
- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).
- r8152: fix the RX FIFO settings when suspending (git-fixes).
- r8152: fix the units of some registers for RTL8156A (git-fixes).
- random: remove useless header comment (git-fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).
- regulator: core: Clean up on enable failure (git-fixes).
- regulator: core: Prevent integer underflow (git-fixes).
- regulator: core: fix UAF in destroy_regulator() (git-fixes).
- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).
- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).
- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).
- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).
- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).
- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).
- remoteproc: imx_rproc: Simplify some error message (git-fixes).
- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).
- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).
- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).
- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).
- restore m_can_lec_type (git-fixes).
- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).
- ring-buffer: Allow splice to read previous partially read pages (git-fixes).
- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (bsc#1204705).
- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).
- ring-buffer: Fix race between reset page and reading page (git-fixes).
- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).
- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).
- ring_buffer: Do not deactivate non-existant pages (git-fixes).
- rose: Fix NULL pointer dereference in rose_send_frame() (git-fixes).
- rose: check NULL rose_loopback_neigh->loopback (git-fixes).
- rpm/check-for-config-changes: add TOOLCHAIN_HAS_* to IGNORED_CONFIGS_RE This new form was added in commit b8c86872d1dc (riscv: fix detection of toolchain Zicbom support).
- rpm/check-for-config-changes: loosen pattern for AS_HAS_* This is needed to handle CONFIG_AS_HAS_NON_CONST_LEB128.
- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.
- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.
- rpm/kernel-source.spec.in: simplify finding of broken symlinks 'find -xtype l' will report them, so use that to make the search a bit faster (without using shell).
- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).
- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).
- rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).
- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).
- rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register() (git-fixes).
- rtmutex: Add acquire semantics for rtmutex lock acquisition slow path (bnc#1203829).
- s390/boot: add secure boot trailer (bsc#1205257 LTC#200451).
- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).
- s390/cpumf: Handle events cycles and instructions identical (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).
- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205427 LTC#200502).
- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).
- s390/hypfs: avoid error message under KVM (bsc#1032323).
- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).
- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (bsc#1205427 LTC#200502).
- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).
- s390/smp: enforce lowcore protection on CPU restart (git-fixes).
- s390/stp: clock_delta should be signed (git-fixes).
- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).
- s390/zcore: fix race when reading from hardware system area (git-fixes).
- s390: fix double free of GS and RI CBs on fork() failure (bsc#1203197 LTC#199895).
- s390: fix nospec table alignments (git-fixes).
- samples/landlock: Add clang-format exceptions (git-fixes).
- samples/landlock: Fix path_list memory leak (git-fixes).
- samples/landlock: Format with clang-format (git-fixes).
- sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up() (git-fixes).
- sbitmap: fix possible io hung due to lost wakeup (git-fixes).
- sched-core-Do-not-requeue-task-on-CPU-excluded-from-cpus_mask.patch
- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).
- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).
- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).
- sched/fair: Remove redundant word ' *' (bnc#1189999 (Scheduler functional and performance backports)).
- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)
- sched/uclamp: Fix rq->uclamp_max not set on first enqueue (git-fixes)
- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Clear ttwu_pending after enqueue_task() (git fixes (sched/core)).
- sched: Disable sched domain debugfs creation on ppc64 unless sched_verbose is specified (bnc#1205653).
- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).
- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh
- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).
- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).
- scripts/faddr2line: Fix regression in name resolution on ppc64le (git-fixes).
- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).
- scripts/gdb: change kernel config dumping method (git-fixes).
- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).
- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).
- scsi: Revert 'scsi: qla2xxx: Fix disk failure to rediscover' (git-fixes).
- scsi: core: Add BLIST_NO_ASK_VPD_SIZE for some VDASD (bsc#1203039).
- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).
- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).
- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).
- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).
- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).
- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).
- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).
- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).
- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).
- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).
- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).
- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).
- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).
- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).
- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).
- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).
- scsi: lpfc: Fix spelling mistake 'unsolicted' -> 'unsolicited' (bsc#1204957).
- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).
- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).
- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939). Dropped: patches.suse/lpfc-decouple-port_template-and-vport_template.patch
- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).
- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).
- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).
- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).
- scsi: lpfc: Remove unneeded result variable (bsc#1203939).
- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).
- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).
- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).
- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).
- scsi: lpfc: Set sli4_param's cmf option to zero when CMF is turned off (bsc#1204957).
- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).
- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).
- scsi: megaraid: Clear READ queue map's nr_queues (git-fixes).
- scsi: megaraid_sas: Correct value passed to scsi_device_lookup() (git-fixes).
- scsi: mpi3mr: Schedule IRQ kthreads only on non-RT kernels (bnc#1204498).
- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).
- scsi: mpt3sas: Fix use-after-free warning (git-fixes).
- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).
- scsi: qedf: Populate sysfs attributes for vport (git-fixes).
- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).
- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).
- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).
- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).
- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).
- scsi: qla2xxx: Define static symbols (bsc#1203935).
- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).
- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).
- scsi: qla2xxx: Enhance driver tracing with separate tunable and more (bsc#1203935).
- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).
- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).
- scsi: qla2xxx: Fix imbalance vha->vref_count (bsc#1201958).
- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).
- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).
- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).
- scsi: qla2xxx: Fix spelling mistake 'definiton' -> 'definition' (bsc#1203935).
- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).
- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).
- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).
- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).
- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).
- scsi: qla2xxx: Update manufacturer details (bsc#1201958).
- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).
- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).
- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).
- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).
- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).
- scsi: scsi_transport_fc: Use %u for dev_loss_tmo (bsc#1202914).
- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Add module param to disable managed ints (bsc#1203893).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).
- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).
- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).
- scsi: storvsc: Fix typo in comment (git-fixes).
- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).
- scsi: storvsc: remove an extraneous 'to' in a comment (git-fixes).
- scsi: ufs: core: Fix another task management completion race (git-fixes).
- scsi: ufs: core: Fix task management completion timeout race (git-fixes).
- scsi: ufs: ufs-pci: Add support for Intel ADL (jsc#PED-707).
- scsi: ufs: ufs-pci: Add support for Intel MTL (jsc#PED-732).
- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).
- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).
- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).
- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).
- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).
- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).
- selftest/vm: verify mmap addr in mremap_test (git-fixes).
- selftest/vm: verify remap destination address in mremap_test (git-fixes).
- selftest: tpm2: Add Client.__del__() to close /dev/tpm* handle (git-fixes).
- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).
- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).
- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).
- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).
- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).
- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).
- selftests/intel_pstate: fix build for ARCH=x86_64 (git-fixes).
- selftests/landlock: Add clang-format exceptions (git-fixes).
- selftests/landlock: Add tests for O_PATH (git-fixes).
- selftests/landlock: Add tests for unknown access rights (git-fixes).
- selftests/landlock: Extend access right tests to directories (git-fixes).
- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).
- selftests/landlock: Format with clang-format (git-fixes).
- selftests/landlock: Fully test file rename with 'remove' access (git-fixes).
- selftests/landlock: Make tests build with old libc (git-fixes).
- selftests/landlock: Normalize array assignment (git-fixes).
- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).
- selftests/livepatch: better synchronize test_klp_callbacks_busy (bsc#1071995).
- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).
- selftests/memfd: remove unused variable (git-fixes).
- selftests/net: pass ipv6_args to udpgso_bench's IPv6 TCP test (git-fixes).
- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).
- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).
- selftests/net: timestamping: Fix bind_phc check (git-fixes).
- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).
- selftests/pidfd_test: Remove the erroneous ',' (git-fixes).
- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).
- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).
- selftests/powerpc: Skip energy_scale_info test on older firmware (git-fixes).
- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).
- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).
- selftests/rseq: Fix ppc32 missing instruction selection 'u' and 'x' for load/store (git-fixes).
- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).
- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).
- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).
- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).
- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).
- selftests/rseq: Introduce thread pointer getters (git-fixes).
- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).
- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).
- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).
- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).
- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).
- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).
- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).
- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).
- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).
- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).
- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).
- selftests/sgx: Treat CC as one argument (git-fixes).
- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).
- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).
- selftests/x86: Add validity check and allow field splitting (git-fixes).
- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).
- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).
- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).
- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).
- selftests: Fix IPv6 address bind tests (git-fixes).
- selftests: Fix raw socket bind tests with VRF (git-fixes).
- selftests: Fix the if conditions of in test_extra_filter() (git-fixes).
- selftests: add ping test with ping_group_range tuned (git-fixes).
- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).
- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).
- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).
- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).
- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).
- selftests: forwarding: Fix failing tests with old libnet (git-fixes).
- selftests: forwarding: add shebang for sch_red.sh (git-fixes).
- selftests: forwarding: fix error message in learning_test (git-fixes).
- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).
- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- selftests: gpio: fix gpio compiling error (git-fixes).
- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).
- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).
- selftests: kvm: set rax before vmcall (git-fixes).
- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).
- selftests: mlxsw: resource_scale: Fix return value (git-fixes).
- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).
- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).
- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).
- selftests: mptcp: fix diag instability (git-fixes).
- selftests: mptcp: fix ipv6 routing setup (git-fixes).
- selftests: mptcp: fix mibit vs mbit mix up (git-fixes).
- selftests: mptcp: make sendfile selftest work (git-fixes).
- selftests: mptcp: more stable diag tests (git-fixes).
- selftests: mptcp: more stable simult_flows tests (git-fixes).
- selftests: net: Correct case name (git-fixes).
- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).
- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).
- selftests: net: tls: remove unused variable and code (git-fixes).
- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).
- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).
- selftests: netfilter: Fix nft_fib.sh for all.rp_filter=1 (git-fixes).
- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).
- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).
- selftests: netfilter: disable rp_filter on router (git-fixes).
- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).
- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).
- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).
- selftests: openat2: Add missing dependency in Makefile (git-fixes).
- selftests: openat2: Print also errno in failure messages (git-fixes).
- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).
- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).
- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).
- selftests: rtc: Increase test timeout so that all tests run (git-fixes).
- selftests: rtnetlink: correct xfrm policy rule in kci_test_ipsec_offload (git-fixes).
- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).
- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).
- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).
- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).
- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).
- selftests: vm: fix clang build error multiple output files (git-fixes).
- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).
- selinux: Add boundary check in put_entry() (git-fixes).
- selinux: access superblock_security_struct in LSM blob way (git-fixes).
- selinux: allow FIOCLEX and FIONCLEX with policy capability (git-fixes).
- selinux: check return value of sel_make_avc_files (git-fixes).
- selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() (git-fixes).
- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).
- selinux: fix double free of cond_list on error paths (git-fixes).
- selinux: fix memleak in security_read_state_kernel() (git-fixes).
- selinux: fix misuse of mutex_is_locked() (git-fixes).
- selinux: use 'grep -E' instead of 'egrep' (git-fixes).
- selinux: use correct type for context length (git-fixes).
- serial: 8250: 8250_omap: Avoid RS485 RTS glitch on ->set_termios() (git-fixes).
- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).
- serial: 8250: Export ICR access helpers for internal use (git-fixes).
- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).
- serial: 8250: Fix restoring termios speed after suspend (git-fixes).
- serial: 8250: Flush DMA Rx on RLSI (git-fixes).
- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).
- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).
- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).
- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).
- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).
- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).
- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).
- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).
- serial: Create uart_xmit_advance() (git-fixes).
- serial: atmel: remove redundant assignment in rs485_config (git-fixes).
- serial: core: move RS485 configuration tasks from drivers into core (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: fsl_lpuart: Reset prior to registration (git-fixes).
- serial: imx: Add missing .thaw_noirq hook (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).
- sfc: disable softirqs for ptp TX (git-fixes).
- sfc: fix kernel panic when creating VF (git-fixes).
- sfc: fix use after free when disabling sriov (git-fixes).
- signal: break out of wait loops on kthread_stop() (bsc#1204926).
- siox: fix possible memory leak in siox_device_add() (git-fixes).
- slimbus: qcom-ngd: cleanup in probe error path (git-fixes).
- slimbus: qcom-ngd: use correct error in message of pdr_add_lookup() failure (git-fixes).
- slimbus: stream: correct presence rate frequencies (git-fixes).
- smb2: small refactor in smb2_check_message() (bsc#1193629).
- smb3: Move the flush out of smb2_copychunk_range() into its callers (bsc#1193629).
- smb3: add dynamic trace points for tree disconnect (bsc#1193629).
- smb3: add trace point for SMB2_set_eof (bsc#1193629).
- smb3: allow deferred close timeout to be configurable (bsc#1193629).
- smb3: check xattr value length earlier (bsc#1193629).
- smb3: clarify multichannel warning (bsc#1193629).
- smb3: do not log confusing message when server returns no network interfaces (bsc#1193629).
- smb3: fix empty netname context on secondary channels (bsc#1193629).
- smb3: fix oops in calculating shash_setkey (bsc#1193629).
- smb3: fix temporary data corruption in collapse range (bsc#1193629).
- smb3: fix temporary data corruption in insert range (bsc#1193629).
- smb3: improve SMB3 change notification support (bsc#1193629).
- smb3: interface count displayed incorrectly (bsc#1193629).
- smb3: missing inode locks in punch hole (bsc#1193629).
- smb3: missing inode locks in zero range (bsc#1193629).
- smb3: must initialize two ACL struct fields to zero (bsc#1193629).
- smb3: remove unneeded null check in cifs_readdir (bsc#1193629).
- smb3: rename encryption/decryption TFMs (bsc#1193629).
- smb3: use filemap_write_and_wait_range instead of filemap_write_and_wait (bsc#1193629).
- smb3: use netname when available on secondary channels (bsc#1193629).
- smb3: workaround negprot bug in some Samba servers (bsc#1193629).
- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).
- soc/tegra: fuse: Drop Kconfig dependency on TEGRA20_APB_DMA (git-fixes).
- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).
- soc: imx8m: Enable OCOTP clock before reading the register (git-fixes).
- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).
- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).
- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).
- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).
- soc: qcom: smem_state: Add refcounting for the 'state->of_node' (git-fixes).
- soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).
- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).
- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).
- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).
- soc: sunxi: sram: Fix probe function ordering issues (git-fixes).
- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).
- soc: sunxi_sram: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- soundwire: cadence: Do not overwrite msg->buf during write commands (git-fixes).
- soundwire: intel: Initialize clock stop timeout (bsc#1205507).
- soundwire: intel: fix error handling on dai registration issues (git-fixes).
- soundwire: qcom: Check device status before reading devid (git-fixes).
- soundwire: qcom: check for outanding writes before doing a read (git-fixes).
- soundwire: qcom: fix device status array range (git-fixes).
- soundwire: qcom: reinit broadcast completion (git-fixes).
- speakup: fix a segfault caused by switching consoles (git-fixes).
- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).
- spi: Add API to count spi acpi resources (bsc#1203699).
- spi: Create helper API to lookup ACPI info for spi device (bsc#1203699).
- spi: Ensure that sg_table won't be used after being freed (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: Fix simplification of devm_spi_register_controller (git-fixes).
- spi: Return deferred probe error when controller isn't yet available (bsc#1203699).
- spi: Support selection of the index of the ACPI Spi Resource before alloc (bsc#1203699).
- spi: dt-bindings: cadence: add missing 'required' (git-fixes).
- spi: dt-bindings: zynqmp-qspi: add missing 'required' (git-fixes).
- spi: dw-dma: decrease reference count in dw_spi_dma_init_mfld() (git-fixes).
- spi: dw: Fix PM disable depth imbalance in dw_spi_bt1_probe (git-fixes).
- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).
- spi: meson-spicc: do not rely on busy flag in pow2 clk ops (git-fixes).
- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).
- spi: propagate error code to the caller of acpi_spi_device_alloc() (bsc#1203699).
- spi: pxa2xx: Add support for Intel Meteor Lake-P (jsc#PED-732).
- spi: pxa2xx: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).
- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).
- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).
- spi: s3c64xx: Fix large transfers with DMA (git-fixes).
- spi: spi-altera-dfl: Fix an error handling path (git-fixes).
- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: stm32: Print summary 'callbacks suppressed' message (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr() that halves spi clk for every run (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).
- spi: tegra210-quad: Fix duplicate resource error (git-fixes).
- spmi: pmic-arb: correct duplicate APID to PPID mapping logic (git-fixes).
- spmi: pmic-arb: do not ack and clear peripheral interrupts in cleanup_irq (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() (git-fixes).
- staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw() (git-fixes).
- staging: vt6655: fix potential memory leak (git-fixes).
- staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).
- stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove() (git-fixes).
- stmmac: intel: Fix an error handling path in intel_eth_pci_probe() (git-fixes).
- struct ehci_hcd: hide new element going into a hole (git-fixes).
- struct xhci_hcd: restore member now dynamically allocated (git-fixes).
- sunrpc: fix expiry of auth creds (git-fixes).
- supported.conf: Add cs_dsp firmware module (bsc#1203699)
- supported.conf: Add drivers/virt/coco/sevguest/sevguest
- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and changed all octeontx2 modules as supported (jsc#SLE-24682)
- supported.conf: mark drivers/nvme/common as supported (jsc#SLE-20183)
- supported.conf: mark lib/objagg supported as dependency of mlxsw
- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)
- supported.conf: mark spi-pxa2xx-platform as supported (bsc#1203699) It's required for the sound on recent Intel machines
- tee: optee: do not check memref size on return from Secure World (git-fixes).
- tee: tee_get_drvdata(): fix description of return value (git-fixes).
- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).
- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).
- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).
- tests: fix idmapped mount_setattr test (git-fixes).
- thermal/drivers/qcom/tsens-v0_1: Fix MSM8939 fourth sensor hw_id (git-fixes).
- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- thermal: cpufreq_cooling: Check the policy first in cpufreq_cooling_register() (git-fixes).
- thermal: int340x: Mode setting with new OS handshake (jsc#PED-678).
- thermal: int340x: Update OS policy capability handshake (jsc#PED-678).
- thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes).
- thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thunderbolt: Add DP OUT resource when DP tunnel is discovered (git-fixes).
- thunderbolt: Add back Intel Falcon Ridge end-to-end flow control workaround (git-fixes).
- thunderbolt: Add missing device ID to tb_switch_is_alpine_ridge() (git-fixes).
- thunderbolt: Add support for Intel Maple Ridge single port controller (git-fixes).
- thunderbolt: Add support for Intel Raptor Lake (jsc#PED-634).
- thunderbolt: Disable LTTPR on Intel Titan Ridge (git-fixes).
- thunderbolt: Explicitly enable lane adapter hotplug events at startup (git-fixes).
- thunderbolt: Explicitly reset plug events delay back to USB4 spec value (git-fixes).
- thunderbolt: Fix buffer allocation of devices with no DisplayPort adapters (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- timers: implement usleep_idle_range() (git-fixes).
- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).
- tools/nolibc: fix incorrect truncation of exit code (git-fixes).
- tools/nolibc: i386: fix initial stack alignment (git-fixes).
- tools/nolibc: x86-64: Fix startup code bug (git-fixes).
- tools/testing/scatterlist: add missing defines (git-fixes).
- tools/thermal: Fix possible path truncations (git-fixes).
- tools: hv: Remove an extraneous 'the' (git-fixes).
- tools: hv: kvp: remove unnecessary (void*) conversions (git-fixes).
- tools: iio: iio_generic_buffer: Fix read size (git-fixes).
- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).
- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).
- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).
- tracing/osnoise: Fix duration type (git-fixes).
- tracing/osnoise: Fix possible recursive locking in stop_per_cpu_kthreads (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tracing/ring-buffer: Have polling block on watermark (git-fixes).
- tracing: Add '(fault)' name injection to kernel probes (git-fixes).
- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).
- tracing: Add tracing_reset_all_online_cpus_unlocked() function (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).
- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).
- tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() (git-fixes).
- tracing: Fix memory leak in tracing_read_pipe() (git-fixes).
- tracing: Fix reading strings from synthetic events (git-fixes).
- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).
- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).
- tracing: Free buffers when a used dynamic event is removed (git-fixes).
- tracing: Have filter accept 'common_cpu' to be consistent (git-fixes).
- tracing: Move duplicate code of trace_kprobe/eprobe.c into header (git-fixes).
- tracing: Replace deprecated CPU-hotplug functions (git-fixes).
- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).
- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).
- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).
- tracing: Wake up waiters when tracing is disabled (git-fixes).
- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).
- tracing: kprobe: Fix kprobe event gen test module on exit (git-fixes).
- tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd() (git-fixes).
- tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit() (git-fixes).
- tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit() (git-fixes).
- tracing: kprobe: Make gen test module work in arm and riscv (git-fixes).
- tty: 8250: Add support for Brainboxes PX cards (git-fixes).
- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).
- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).
- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).
- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).
- tty: n_gsm: Modify cr bit value when config requester (git-fixes).
- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).
- tty: n_gsm: Save dlci address open status when config requester (git-fixes).
- tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() (git-fixes).
- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).
- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).
- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).
- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).
- tty: n_gsm: fix DM command (git-fixes).
- tty: n_gsm: fix broken virtual tty handling (git-fixes).
- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).
- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).
- tty: n_gsm: fix decoupled mux resource (git-fixes).
- tty: n_gsm: fix encoding of command/response bit (git-fixes).
- tty: n_gsm: fix flow control handling in tx path (git-fixes).
- tty: n_gsm: fix frame reception handling (git-fixes).
- tty: n_gsm: fix incorrect UA handling (git-fixes).
- tty: n_gsm: fix insufficient txframe size (git-fixes).
- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).
- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).
- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).
- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).
- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).
- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).
- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).
- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).
- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).
- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).
- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).
- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).
- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).
- tty: n_gsm: fix reset fifo race condition (git-fixes).
- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).
- tty: n_gsm: fix restart handling via CLD command (git-fixes).
- tty: n_gsm: fix sleep-in-atomic-context bug in gsm_control_send (git-fixes).
- tty: n_gsm: fix software flow control handling (git-fixes).
- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).
- tty: n_gsm: fix tty registration before control channel open (git-fixes).
- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).
- tty: n_gsm: fix wrong DLCI release order (git-fixes).
- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).
- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).
- tty: n_gsm: fix wrong command retry handling (git-fixes).
- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).
- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).
- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).
- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: atmel: Preserve previous USART mode if RS485 disabled (git-fixes).
- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).
- tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (git-fixes).
- tty: serial: fsl_lpuart: do not break the on-going transfer when global reset (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- tty: xilinx_uartps: Fix the ignore_status (git-fixes).
- tun: avoid double free in tun_free_netdev (git-fixes).
- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).
- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).
- uaccess: fix type mismatch warnings from access_ok() (git-fixes).
- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).
- uas: ignore UAS for Thinkplus chips (git-fixes).
- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).
- ucounts: Fix rlimit max values check (git-fixes).
- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).
- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).
- ucounts: In set_cred_ucounts assume new->ucounts is non-NULL (git-fixes).
- udf: Fix crash after seekdir (bsc#1194592).
- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).
- udmabuf: Set ubuf->sg = NULL if the creation of sg table fails (git-fixes).
- udmabuf: add back sanity check (git-fixes).
- units: Add SI metric prefix definitions (git-fixes).
- units: add the HZ macros (git-fixes).
- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).
- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).
- usb.h: struct usb_device: hide new member (git-fixes).
- usb/hcd: Fix dma_map_sg error check (git-fixes).
- usb: Drop commas after SoC match table sentinels (git-fixes).
- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).
- usb: bdc: change state when port disconnected (git-fixes).
- usb: cdc-wdm: Use skb_put_data() instead of skb_put/memcpy pair (git-fixes).
- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).
- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).
- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).
- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).
- usb: cdns3: fix random warning message when driver load (git-fixes).
- usb: cdns3: host: fix endless superspeed hub port reset (git-fixes).
- usb: cdnsp: Fix issue with Clear Feature Halt Endpoint (git-fixes).
- usb: cdnsp: fix issue with ZLP - added TD_SIZE = 1 (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: common: debug: Check non-standard control requests (git-fixes).
- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).
- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).
- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).
- usb: dwc3: core: Enable GUCTL1 bit 10 for fixing termination error after resume bug (git-fixes).
- usb: dwc3: core: leave default DMA if the controller does not support 64-bit DMA (git-fixes).
- usb: dwc3: disable USB core PHY management (git-fixes).
- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).
- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).
- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).
- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).
- usb: dwc3: gadget: Do not modify GEVNTCOUNT in pullup() (git-fixes).
- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).
- usb: dwc3: gadget: Refactor pullup() (git-fixes).
- usb: dwc3: gadget: Return -ESHUTDOWN on ep disable (git-fixes).
- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).
- usb: dwc3: gadget: conditionally remove requests (git-fixes).
- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).
- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).
- usb: dwc3: pci: Add support for Intel Raptor Lake (git-fixes).
- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).
- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).
- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).
- usb: ehci: Fix a function name in comments (git-fixes).
- usb: gadget: bdc: fix typo in comment (git-fixes).
- usb: gadget: f_fs: stricter integer overflow checks (git-fixes).
- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).
- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).
- usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes).
- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- usb: host: xhci-plat: suspend and resume clocks (git-fixes).
- usb: host: xhci-plat: suspend/resume clks for brcm (git-fixes).
- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() (git-fixes).
- usb: host: xhci: fix a comment typo in xhci_mem_init() (git-fixes).
- usb: host: xhci: use ffs() in xhci_mem_init() (git-fixes).
- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- usb: hub: avoid warm port reset during USB3 disconnect (git-fixes).
- usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).
- usb: mon: make mmapped memory read only (git-fixes).
- usb: mtu3: fix failed runtime suspend in host only mode (git-fixes).
- usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).
- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- usb: renesas: Fix refcount leak bug (git-fixes).
- usb: smsc: use eth_hw_addr_set() (git-fixes).
- usb: storage: Add ASUS <0x0b05:0x1932> to IGNORE_UAS (git-fixes).
- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- usb: typec: intel_pmc_mux: Add new ACPI ID for Meteor Lake IOM device (git-fixes).
- usb: typec: mux: Enter safe mode only when pins need to be reconfigured (git-fixes).
- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).
- usb: typec: tcpm: fix typo in comment (git-fixes).
- usb: typec: tipd: Add an additional overflow check (git-fixes).
- usb: typec: tipd: Do not read/write more bytes than required (git-fixes).
- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- usb: typec: ucsi: Remove incorrect warning (git-fixes).
- usb: xhci-mtk: check boundary before check tt (git-fixes).
- usb: xhci-mtk: relax TT periodic bandwidth allocation (git-fixes).
- usb: xhci-mtk: update fs bus bandwidth by bw_budget_table (git-fixes).
- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).
- usb: xhci: tegra: Fix error check (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).
- usbnet: Run unregister_netdev() before unbind() again (git-fixes).
- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).
- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).
- usbnet: smsc95xx: Do not reset PHY behind PHY driver's back (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).
- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).
- v3 of 'PCI: hv: Only reuse existing IRTE allocation for Multi-MSI'
- vboxguest: Do not use devm for irq (git-fixes).
- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).
- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).
- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- vfio/type1: Unpin zero pages (git-fixes).
- vfio: Clear the caps->buf to NULL after free (git-fixes).
- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).
- video/fbdev/stifb: Implement the stifb_fillrect() function (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: i740fb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virt: Add SEV-SNP guest driver (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Add support to derive key (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Add support to get extended report (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Fix bool function returning negative value (jsc#SLE-19924, jsc#SLE-24814).
- virt: sevguest: Fix return value check in alloc_shared_pages() (jsc#SLE-19924, jsc#SLE-24814).
- virt: vbox: convert to use dev_groups (git-fixes).
- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: correctly report encapsulated LRO packet (git-fixes).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use correct intrConf reference when using extended queues (git-fixes).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).
- vrf: fix packet sniffing for traffic originating from ip tunnels (git-fixes).
- vsock/virtio: enable VQs early on probe (git-fixes).
- vsock/virtio: initialize vdev->priv before using VQs (git-fixes).
- vsock/virtio: read the negotiated features before using VQs (git-fixes).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- vsock: fix possible infinite sleep in vsock_connectible_wait_data() (git-fixes).
- vsock: remove the unused 'wait' in vsock_connectible_recvmsg() (git-fixes).
- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).
- vt: Clear selection before changing the font (git-fixes).
- watch-queue: remove spurious double semicolon (git-fixes).
- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).
- watch_queue: Fix missing rcu annotation (git-fixes).
- watchdog-export-lockup_detector_reconfigure.patch.
- watchdog/hpwdt: Include nmi.h only if CONFIG_HPWDT_NMI_DECODING (git-fixes).
- watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure (git-fixes).
- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).
- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).
- watchqueue: make sure to serialize 'wqueue->defunct' properly (git-fixes).
- wifi: airo: do not assign -1 to unsigned char (git-fixes).
- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).
- wifi: ath11k: Fix QCN9074 firmware boot on x86 (git-fixes).
- wifi: ath11k: avoid deadlock during regulatory update in ath11k_regd_update() (git-fixes).
- wifi: ath11k: fix number of VHT beamformee spatial streams (git-fixes).
- wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).
- wifi: brcmfmac: fix invalid address access when enabling SCAN log level (git-fixes).
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (git-fixes).
- wifi: cfg80211/mac80211: reject bad MBSSID elements (git-fixes).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: cfg80211: do not allow multi-BSSID in S1G (git-fixes).
- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).
- wifi: cfg80211: fix ieee80211_data_to_8023_exthdr handling of small packets (git-fixes).
- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).
- wifi: cfg80211: silence a sparse RCU warning (git-fixes).
- wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).
- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other cases) (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).
- wifi: mac80211: Fix ack frame idr leak when mesh has no route (git-fixes).
- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).
- wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on fast-rx (git-fixes).
- wifi: mac80211: fix decap offload for stations on AP_VLAN interfaces (git-fixes).
- wifi: mac80211: fix memory free error when registering wiphy fail (git-fixes).
- wifi: mac80211: fix probe req HE capabilities access (git-fixes).
- wifi: mac80211: fix regression with non-QoS drivers (git-fixes).
- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).
- wifi: mac80211_hwsim: check length for virtio packets (git-fixes).
- wifi: mac80211_hwsim: fix debugfs attribute ps with rc table support (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).
- wifi: mt76: fix reading current per-tid starting sequence number for aggregation (git-fixes).
- wifi: mt76: mt7615: add mt7615_mutex_acquire/release in mt7615_sta_set_decap_offload (git-fixes).
- wifi: mt76: mt7915: do not check state before configuring implicit beamform (git-fixes).
- wifi: mt76: mt7921: reset msta->airtime_ac while clearing up hw value (git-fixes).
- wifi: mt76: sdio: fix transmitting packet hangs (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).
- wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).
- wifi: rt2x00: set SoC wmac clock register (git-fixes).
- wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).
- wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).
- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).
- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).
- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).
- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).
- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).
- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).
- wifi: rtlwifi: 8192de: correct checking of IQK reload (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).
- wifi: rtw88: add missing destroy_workqueue() on error path in rtw_core_init() (git-fixes).
- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).
- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).
- wifi: wext: use flex array destination for memcpy() (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute (git-fixes).
- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute (git-fixes).
- wifi: wilc1000: validate number of channels (git-fixes).
- wifi: wilc1000: validate pairwise and authentication suite offsets (git-fixes).
- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).
- wireless: Remove redundant 'flush_workqueue()' calls (bsc#1202131).
- workqueue: do not skip lockdep work dependency in cancel_work_sync() (git-fixes).
- wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new() (git-fixes).
- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).
- x86/Xen: streamline (and fix) PV CPU enumeration (git-fixes).
- x86/boot: Add Confidential Computing type to setup_data (jsc#SLE-19924, jsc#SLE-24814).
- x86/boot: Add a pointer to Confidential Computing blob in bootparams (jsc#SLE-19924, jsc#SLE-24814).
- x86/boot: Do not propagate uninitialized boot_params->cc_blob_address (bsc#1204970).
- x86/boot: Fix the setup data types max limit (bsc#1204970).
- x86/boot: Introduce helpers for MSR reads/writes (jsc#SLE-19924, jsc#SLE-24814).
- x86/boot: Put globals that are accessed early into the .data section (jsc#SLE-19924, jsc#SLE-24814).
- x86/boot: Use MSR read/write helpers instead of inline assembly (jsc#SLE-19924, jsc#SLE-24814).
- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).
- x86/compressed/64: Add identity mapping for Confidential Computing blob (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/64: Add identity mappings for setup_data entries (bsc#1204970).
- x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/64: Detect/setup SEV/SME features earlier during boot (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI config table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI detection to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI kexec handling into common code (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI system table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed/acpi: Move EFI vendor table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Add helper for validating pages in the decompression stage (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Export and rename add_identity_map() (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).
- x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).
- x86/cpu: Restore AMD's DE_CFG MSR after resume (bsc#1205473).
- x86/entry: Work around Clang __bdos() bug (git-fixes).
- x86/extable: Extend extable functionality (git-fixes).
- x86/fpu: Drop fpregs lock before inheriting FPU permissions (bnc#1205282).
- x86/futex: Remove .fixup usage (git-fixes).
- x86/head/64: Re-enable stack protection (jsc#SLE-19924, jsc#SLE-24814).
- x86/hyperv: Disable hardlockup detector by default in Hyper-V guests (git-fixes).
- x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition (git-fixes).
- x86/hyperv: Update 'struct hv_enlightened_vmcs' definition (git-fixes).
- x86/hyperv: fix invalid writes to MSRs during root partition kexec (git-fixes).
- x86/ibt,ftrace: Make function-graph play nice (bsc#1203969).
- x86/kernel: Mark the .bss..decrypted section as shared in the RMP table (jsc#SLE-19924, jsc#SLE-24814).
- x86/kernel: Validate ROM memory before accessing when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).
- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).
- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).
- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).
- x86/mm: Extend cc_attr to include AMD SEV-SNP (jsc#SLE-19924, jsc#SLE-24814).
- x86/mm: Validate memory when changing the C-bit (jsc#SLE-19924, jsc#SLE-24814).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).
- x86/sev: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Add a helper for the PVALIDATE instruction (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Add a sev= cmdline option (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Add helper for validating pages in early enc attribute changes (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Add missing __init annotations to SEV init routines (jsc#SLE-19924 jsc#SLE-24814).
- x86/sev: Annotate stack change in the #VC handler (bsc#1204970).
- x86/sev: Check SEV-SNP features support (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Check the VMPL level (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).
- x86/sev: Detect/setup SEV/SME features earlier in boot (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Do not use cc_platform_has() for early SEV-SNP calls (bsc#1204970).
- x86/sev: Get the AP jump table address from secrets page (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Move MSR-based VMGEXITs for CPUID to helper (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Provide support for SNP guest request NAEs (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Register SEV-SNP guest request platform device (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Remove duplicated assignment to variable info (bsc#1204970).
- x86/sev: Save the negotiated GHCB version (bsc#1190497).
- x86/sev: Use SEV-SNP AP creation to start secondary CPUs (jsc#SLE-19924, jsc#SLE-24814).
- x86/sev: Use firmware-validated CPUID for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).
- x86/uaccess: Implement macros for CMPXCHG on user addresses (git-fixes).
- x86/xen: Remove undefined behavior in setup_features() (git-fixes).
- xen-blkback: Advertise feature-persistent as user requested (git-fixes).
- xen-blkback: Apply 'feature_persistent' parameter when connect (git-fixes).
- xen-blkback: fix persistent grants negotiation (git-fixes).
- xen-blkfront: Advertise feature-persistent as user requested (git-fixes).
- xen-blkfront: Apply 'feature_persistent' parameter when connect (git-fixes).
- xen-blkfront: Cache feature_persistent value before advertisement (git-fixes).
- xen-blkfront: Handle NULL gendisk (git-fixes).
- xen-netback: only remove 'hotplug-status' when the vif is actually destroyed (git-fixes).
- xen/gntdev: Accommodate VMA splitting (git-fixes).
- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).
- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).
- xen/gntdev: Prevent leaking grants (git-fixes).
- xen/gntdev: fix unmap notification order (git-fixes).
- xen/grants: prevent integer overflow in gnttab_dma_alloc_pages() (git-fixes).
- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).
- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).
- xen/usb: do not use arbitrary_virt_to_machine() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 (git-fixes).
- xen: detect uninitialized xenbus in xenbus_init (git-fixes).
- xen: do not continue xenstore initialization in case of errors (git-fixes).
- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).
- xfs: convert XLOG_FORCED_SHUTDOWN() to xlog_is_shutdown() (git-fixes).
- xfs: fix perag reference leak on iteration race with growfs (git-fixes).
- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).
- xfs: fix use-after-free in xattr node block inactivation (git-fixes).
- xfs: fix xfs_ifree() error handling to not leak perag ref (git-fixes).
- xfs: fold perag loop iteration logic into helper function (git-fixes).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: only bother with sync_filesystem during readonly remount (git-fixes).
- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).
- xfs: rename the next_agno perag iteration variable (git-fixes).
- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).
- xfs: reserve quota for dir expansion when linking/unlinking files (bsc#1205616).
- xfs: reserve quota for target dir expansion when renaming files (bsc#1205679).
- xfs: revert 'xfs: actually bump warning counts when we send warnings' (git-fixes).
- xfs: terminate perag iteration reliably on agcount (git-fixes).
- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xfs: use setattr_copy to set vfs inode attributes (git-fixes).
- xhci-pci: Set runtime PM as default policy on all xHC 1.2 or later devices (git-fixes).
- xhci: Add quirk to reset host back to default state at shutdown (git-fixes).
- xhci: Allocate separate command structures for each LPM command (git-fixes).
- xhci: Do not show warning for reinit on known broken suspend (git-fixes).
- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
- xhci: dbc: Fix memory leak in xhci_alloc_dbc() (git-fixes).
- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).
- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).
- xhci: dbc: refactor xhci_dbc_init() (git-fixes).
- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).
- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).
- zonefs: Clear inode information flags on inode creation (git-fixes).
- zonefs: Fix management of open zones (git-fixes).
- zonefs: add MODULE_ALIAS_FS (git-fixes).
Patchnames
SUSE-2022-4617,SUSE-SLE-Micro-5.3-2022-4617,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4617,SUSE-SLE-Module-RT-15-SP4-2022-4617,openSUSE-Leap-Micro-5.3-2022-4617,openSUSE-SLE-15.4-2022-4617
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-4378: Fixed stack overflow in __do_proc_dointvec (bsc#1206207).\n- CVE-2022-42328: Guests could trigger denial of service via the netback driver (bsc#1206114).\n- CVE-2022-42329: Guests could trigger denial of service via the netback driver (bsc#1206113).\n- CVE-2022-3643: Guests could trigger NIC interface reset/abort/crash via netback driver (bsc#1206113).\n- CVE-2022-3633: Fixed a memory leak in j1939_session_destroy of the file net/can/j1939/transport.c (bsc#1204650).\n- CVE-2022-3114: Fixed a denial of service in imx_register_uart_clocks() in drivers/clk/imx/clk.c (bsc#1206391).\n- CVE-2022-3619: Fixed a memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (bsc#1204569).\n- CVE-2022-3635: Fixed a use-after-free in the tst_timer() of the file drivers/atm/idt77252.c (bsc#1204631).\n- CVE-2022-41850: Fixed a race condition in roccat_report_event() in drivers/hid/hid-roccat.c (bsc#1203960).\n- CVE-2022-45934: Fixed a integer wraparound via L2CAP_CONF_REQ packets in l2cap_config_req in net/bluetooth/l2cap_core.c (bsc#1205796).\n- CVE-2022-3567: Fixed a to race condition in inet6_stream_ops()/inet6_dgram_ops() (bsc#1204414).\n- CVE-2022-41858: Fixed a denial of service in sl_tx_timeout() in drivers/net/slip (bsc#1205671).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2022-4095: Fixed a use-after-free in rtl8712 driver (bsc#1205514).\n- CVE-2022-3903: Fixed a denial of service with the Infrared Transceiver USB driver (bsc#1205220).\n- CVE-2022-42896: Fixed a use-after-free vulnerability in the net/bluetooth/l2cap_core.c's l2cap_connect() and l2cap_le_connect_req() which may have allowed code execution and leaking kernel memory (respectively) remotely via Bluetooth (bsc#1205709).\n- CVE-2022-42895: Fixed an information leak in the net/bluetooth/l2cap_core.c's l2cap_parse_conf_req() which can be used to leak kernel pointers remotely (bsc#1205705).\n- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(), gru_fault() and gru_handle_user_call_os() that could lead to kernel panic (bsc#1204166).\n- CVE-2022-3628: Fixed potential buffer overflow in brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).\n- CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices (bsc#1202686).\n- CVE-2021-4037: Fixed function logic vulnerability that allowed local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set (bsc#1198702).\n- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space client to corrupt the monitor's internal memory (bsc#1204653).\n- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bsc#1204402).\n- CVE-2022-3629: Fixed memory leak in vsock_connect() in net/vmw_vsock/af_vsock.c (bsc#1204635).\n- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in fs/nilfs2/segment.c (bsc#1204646).\n- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in fs/nilfs2/inode.c (bsc#1204647).\n- CVE-2022-3621: Fixed null pointer dereference in nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bsc#1204574).\n- CVE-2022-3594: Fixed excessive data logging in intr_callback() in drivers/net/usb/r8152.c (bsc#1204479).\n- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could allow a local unprivileged user to cause a denial of service (bsc#1204439).\n- CVE-2022-3565: Fixed use-after-free in del_timer() in drivers/isdn/mISDN/l1oip_core.c (bsc#1204431).\n- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6 handler (bsc#1204354).\n- CVE-2022-40768: Fixed information leak in the scsi driver which allowed local users to obtain sensitive information from kernel memory (bsc#1203514).\n- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf anon_vma double reuse (bsc#1204168).\n- CVE-2022-3169: Fixed an denial of service though request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).\n- CVE-2022-3545: Fixed a use-after-free vulnerability is area_cache_get() of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bsc#1204415).\n- CVE-2022-3521: Fixed a race condition in kcm_tx_work() of the file net/kcm/kcmsock.c (bsc#1204355).\n- CVE-2022-2153: Fixed a NULL pointer dereference in KVM when attempting to set a SynIC IRQ (bsc#1200788).\n- CVE-2022-33981: Fixed a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function (bsc#1200692).\n- CVE-2022-45869: Fixed a race condition in the x86 KVM subsystem which could cause a denial of service (bsc#1205882).\n- CVE-2022-45888: Fixed a use-after-free during physical removal of a USB devices when using drivers/char/xillybus/xillyusb.c (bsc#1205764).\n- CVE-2022-4139: Fixed an issue with the i915 driver that allowed the GPU to access any physical memory (bsc#1205700).\n- CVE-2022-4129: Fixed a denial of service with the Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. (bsc#1205711)\n- CVE-2022-3566: Fixed a race condition in the functions tcp_getsockopt/tcp_setsockopt. The manipulation leads to a race condition (bsc#1204405).\n- CVE-2022-2602: Fixed a local privilege escalation vulnerability involving Unix socket Garbage Collection and io_uring (bsc#1204228).\n- CVE-2022-3176: Fixed a use-after-free in io_uring related to signalfd_poll() and binder_poll() (bsc#1203391).\n- CVE-2022-3707: Fixed a double free in the Intel GVT-g graphics driver (bsc#1204780).\n- CVE-2022-3625: Fixed a user-after-free vulnerability in devlink_param_set/devlink_param_get of the file net/core/devlink.c (bsc#1204637).\n- CVE-2022-3535: Fixed a memory leak in mvpp2_dbgfs_port_init of the file drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bsc#1204417).\n- CVE-2022-39189: Fixed an issue were an unprivileged guest users can compromise the guest kernel because TLB flush operations were mishandled in certain KVM_VCPU_PREEMPTED situations (bsc#1203066).\n- CVE-2022-3577: Fixed an out-of-bounds memory write in bigben_probe of drivers/hid/hid-bigbenff.c (bsc#1204470).\n- CVE-2022-2978: Fixed a use-after-free in the NILFS file system (bsc#1202700).\n- CVE-2022-1184: Fixed a use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (bsc#1198577).\n- CVE-2022-1263: Fixed a NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allowed an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service (bsc#1198189).\n- CVE-2022-1882: Fixed a use-after-free flaw in free_pipe_info() that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1199904).\n- CVE-2022-20369: Fixed possible out of bounds write due to improper input validation in v4l2_m2m_querybuf of v4l2-mem2mem.c (bsc#1202347).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-26373: Fixed CPU information leak via post-barrier RSB predictions (bsc#1201726).\n- CVE-2022-2639: Fixed integer underflow that could lead to out-of-bounds write in reserve_sfa_size() (bsc#1202154).\n- CVE-2022-2663: Fixed an issue which allowed a firewall to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured (bsc#1202097).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-28356: Fixed a refcount bug in llc_ui_bind and llc_ui_autobind which could allow an unprivileged user to execute a denial of service. (bsc#1197391)\n- CVE-2022-2873: Fixed an out-of-bounds memory access flaw that was found in iSMT SMBus host controller driver (bsc#1202558).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202860).\n- CVE-2022-2938: Fixed a flaw that was found inside the Pressure Stall Information implementation that could have been used to allow an attacker to crash the system or have other memory-corruption side effects (bsc#1202623).\n- CVE-2022-2959: Fixed a race condition that was found inside the watch queue due to a missing lock in pipe_resize_ring() (bsc#1202681).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-3028: Fixed a race condition that was found in the IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously (bsc#1202898).\n- CVE-2022-3078: Fixed a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c (bsc#1203041).\n- CVE-2022-3202: Fixed a NULL pointer dereference flaw in Journaled File System. This could allow a local attacker to crash the system or leak kernel internal information (bsc#1203389).\n- CVE-2022-32250: Fixed user-after-free in net/netfilter/nf_tables_api.c that could allow local privilege escalation (bsc#1200015).\n- CVE-2022-32296: Fixed vulnerability where TCP servers were allowed to identify clients by observing what source ports are used (bsc#1200288).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bsc#1203552).\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bsc#1203769).\n- CVE-2022-3435: Fixed an out-of-bounds read in fib_nh_match() of the file net/ipv4/fib_semantics.c (bsc#1204171).\n- CVE-2022-3526: Fixed a memory leak in macvlan_handle_frame() from drivers/net/macvlan.c (bsc#1204353).\n- CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in net/bluetooth/l2cap_core.c (bsc#1204619).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bsc#1201948).\n- CVE-2022-36946: Fixed a denial of service inside nfqnl_mangle in net/netfilter/nfnetlink_queue.c (bsc#1201940).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bsc#1203107).\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bsc#1203117).\n- CVE-2022-40476: Fixed a null pointer dereference in fs/io_uring.c (bsc#1203435).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bsc#1202960).\n- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the reception of specific WiFi Frames (bsc#1203770).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bsc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bsc#1203992).\n- CVE-2022-42719: Fixed remote code execution with wlan frames when parsing a multi-BSSID element (bsc#1204051).\n- CVE-2022-42720: Fixed remote code execution due to refcounting bugs (bsc#1204059).\n- CVE-2022-42721: Fixed remote code execution due list corruption in the wlan stack (bsc#1204060).\n- CVE-2022-42722: Fixed crash in beacon protection for P2P-device. (bsc#1204125)\n- CVE-2021-33135: Fixed uncontrolled resource consumption inside Intel(R) SGX that may have allowed an authenticated user to potentially enable denial of service via local access (bsc#1199515).\n- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bsc#1177471)\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bsc#1196616).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bsc#1023051).\n\nThe following non-security bugs were fixed:\n\n- 9p: Fix refcounting during full path walks for fid lookups (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl (git-fixes).\n- 9p: fix fid refcount leak in v9fs_vfs_get_link (git-fixes).\n- ACPI / scan: Create platform device for CS35L41 (bsc#1203699).\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() (git-fixes).\n- ACPI: APEI: do not add task_work to kernel thread to avoid memory leak (git-fixes).\n- ACPI: APEI: explicit init of HEST and GHES in apci_init() (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Drop the EC_FLAGS_IGNORE_DSDT_GPE quirk (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: HMAT: Fix initiator registration for single-initiator systems (git-fixes).\n- ACPI: HMAT: Release platform device in case of platform_device_add_data() fails (git-fixes).\n- ACPI: HMAT: remove unnecessary variable initialization (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: VIOT: Fix ACS setup (git-fixes).\n- ACPI: extlog: Handle multiple records (git-fixes).\n- ACPI: processor idle: Practically limit 'Dummy wait' workaround to old Intel systems (bsc#1203767).\n- ACPI: processor/idle: Annotate more functions to live in cpuidle section (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: resource: skip IRQ override on AMD Zen platforms (git-fixes).\n- ACPI: scan: Add CLSA0101 Laptop Support (bsc#1203699).\n- ACPI: scan: Add LATT2021 to acpi_ignore_dep_ids[] (git-fixes).\n- ACPI: tables: FPDT: Do not call acpi_os_map_memory() on invalid phys address (git-fixes).\n- ACPI: thermal: drop an always true check (git-fixes).\n- ACPI: utils: Add api to read _SUB from ACPI (bsc#1203699).\n- ACPI: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Make backlight class device registration a separate step (v2) (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ACPI: x86: Add a quirk for Dell Inspiron 14 2-in-1 for StorageD3Enable (git-fixes).\n- ACPI: x86: Add another system to quirk list for forcing StorageD3Enable (git-fixes).\n- ALSA: Use del_timer_sync() before freeing timer (git-fixes).\n- ALSA: ac97: fix possible memory leak in snd_ac97_dev_register() (git-fixes).\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: aoa: Fix I2S device accounting (git-fixes).\n- ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev() (git-fixes).\n- ALSA: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).\n- ALSA: au88x0: use explicitly signed char (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: core: Fix double-free at snd_card_new() (git-fixes).\n- ALSA: cs35l41: Check hw_config before using it (bsc#1203699).\n- ALSA: cs35l41: Enable Internal Boost in shared lib (bsc#1203699).\n- ALSA: cs35l41: Move cs35l41_gpio_config to shared lib (bsc#1203699).\n- ALSA: cs35l41: Unify hardware configuration (bsc#1203699).\n- ALSA: dice: fix regression for Lexicon I-ONIX FW810S (git-fixes).\n- ALSA: dmaengine: increment buffer pointer atomically (git-fixes).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda/ca0132: add quirk for EVGA Z390 DARK (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/conexant: add a new hda codec SN6140 (git-fixes).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Add Speaker Playback Switch for Warlock (bsc#1203699).\n- ALSA: hda/cs8409: Add new Dolphin HW variants (bsc#1203699).\n- ALSA: hda/cs8409: Disable HSBIAS_SENSE_EN for Cyborg (bsc#1203699).\n- ALSA: hda/cs8409: Fix Full Scale Volume setting for all variants (bsc#1203699).\n- ALSA: hda/cs8409: Fix Warlock to use mono mic configuration (bsc#1203699).\n- ALSA: hda/cs8409: Re-order quirk table into ascending order (bsc#1203699).\n- ALSA: hda/cs8409: Support manual mode detection for CS42L42 (bsc#1203699).\n- ALSA: hda/cs8409: Support new Dolphin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Odin Variants (bsc#1203699).\n- ALSA: hda/cs8409: Support new Warlock MLK Variants (bsc#1203699).\n- ALSA: hda/cs8409: Use general cs42l42 include in cs8409 hda driver (bsc#1203699).\n- ALSA: hda/cs8409: change cs8409_fixups v.pins initializers to static (bsc#1203699).\n- ALSA: hda/cs_dsp_ctl: Fix mutex inversion when creating controls (bsc#1203699).\n- ALSA: hda/hdmi - enable runtime pm for more AMD display audio (git-fixes).\n- ALSA: hda/hdmi: Do not skip notification handling during PM operation (git-fixes).\n- ALSA: hda/hdmi: Fix the converter allocation for the silent stream (git-fixes).\n- ALSA: hda/hdmi: Fix the converter reuse for the silent stream (git-fixes).\n- ALSA: hda/hdmi: change type for the 'assigned' variable (git-fixes).\n- ALSA: hda/realtek: Add CS35L41 support for Thinkpad laptops (bsc#1203699).\n- ALSA: hda/realtek: Add Intel Reference SSID to support headset keys (git-fixes).\n- ALSA: hda/realtek: Add Positivo C6300 model quirk (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 16 (8902) mute LED (git-fixes).\n- ALSA: hda/realtek: Add another HP ZBook G9 model quirks (bsc#1203699).\n- ALSA: hda/realtek: Add mute and micmut LED support for Zbook Fury 17 G9 (bsc#1203699).\n- ALSA: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).\n- ALSA: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (bsc#1203922).\n- ALSA: hda/realtek: Add quirk for ASUS Zenbook using CS35L41 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU, NS70PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga7 14IAL7 (bsc#1203699).\n- ALSA: hda/realtek: Add quirk for Lenovo Yoga9 14IAP7 (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add quirks for ASUS Zenbooks using CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Add speaker AMP init for Samsung laptops with ALC298 (git-fixes).\n- ALSA: hda/realtek: Add support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Add support for Legion 7 16ACHg6 laptop (bsc#1203699).\n- ALSA: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output Dell Precision 5570 laptop (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845/865 G9 (bsc#1203699).\n- ALSA: hda/realtek: Enable mute/micmute LEDs support for HP Laptops (bsc#1203699).\n- ALSA: hda/realtek: Enable speaker and mute LEDs for HP laptops (bsc#1203699).\n- ALSA: hda/realtek: Fix LED on Zbook Studio G9 (bsc#1203699).\n- ALSA: hda/realtek: Fix mute led issue on thinkpad with cs35l41 s-codec (bsc#1203699).\n- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (bsc#1205100).\n- ALSA: hda/realtek: More robust component matching for CS35L41 (bsc#1203699).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: hda/realtek: fix speakers for Samsung Galaxy Book Pro (bsc#1205100).\n- ALSA: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530 (git-fixes).\n- ALSA: hda/sigmatel: Fix unused variable warning for beep power change (git-fixes).\n- ALSA: hda/sigmatel: Keep power up while beep is enabled (bsc#1200544).\n- ALSA: hda/tegra: Add Tegra234 hda driver support (git-fixes).\n- ALSA: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).\n- ALSA: hda/tegra: Update scratch reg. communication (git-fixes).\n- ALSA: hda/tegra: set depop delay for tegra (git-fixes).\n- ALSA: hda: Fix Nvidia dp infoframe (git-fixes).\n- ALSA: hda: Fix dependencies of CS35L41 on SPI/I2C buses (bsc#1203699).\n- ALSA: hda: Fix dependency on ASoC cs35l41 codec (bsc#1203699).\n- ALSA: hda: Fix hang at HD-audio codec unbinding due to refcount saturation (git-fixes).\n- ALSA: hda: Fix position reporting on Poulsbo (git-fixes).\n- ALSA: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).\n- ALSA: hda: cs35l41: Add Amp Name based on channel and index (bsc#1203699).\n- ALSA: hda: cs35l41: Add Boost type flag (bsc#1203699).\n- ALSA: hda: cs35l41: Add Support for Interrupts (bsc#1203699).\n- ALSA: hda: cs35l41: Add calls to newly added test key function (bsc#1203699).\n- ALSA: hda: cs35l41: Add defaulted values into dsp bypass config sequence (bsc#1203699).\n- ALSA: hda: cs35l41: Add initial DSP support and firmware loading (bsc#1203699).\n- ALSA: hda: cs35l41: Add missing default cases (bsc#1203699).\n- ALSA: hda: cs35l41: Add module parameter to control firmware load (bsc#1203699).\n- ALSA: hda: cs35l41: Add support for CS35L41 in HDA systems (bsc#1203699).\n- ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations (bsc#1203699).\n- ALSA: hda: cs35l41: Always configure the DAI (bsc#1203699).\n- ALSA: hda: cs35l41: Avoid overwriting register patch (bsc#1203699).\n- ALSA: hda: cs35l41: Clarify support for CSC3551 without _DSD Properties (bsc#1203699).\n- ALSA: hda: cs35l41: Consolidate selections under SND_HDA_SCODEC_CS35L41 (bsc#1203699).\n- ALSA: hda: cs35l41: Do not dereference fwnode handle (bsc#1203699).\n- ALSA: hda: cs35l41: Drop wrong use of ACPI_PTR() (bsc#1203699).\n- ALSA: hda: cs35l41: Enable GPIO2 Interrupt for CLSA0100 laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Fix I2S params comments (bsc#1203699).\n- ALSA: hda: cs35l41: Fix comments wrt serial-multi-instantiate reference (bsc#1203699).\n- ALSA: hda: cs35l41: Fix error in spi cs35l41 hda driver name (bsc#1203699).\n- ALSA: hda: cs35l41: Handle all external boost setups the same way (bsc#1203699).\n- ALSA: hda: cs35l41: Improve dev_err_probe() messaging (bsc#1203699).\n- ALSA: hda: cs35l41: Make cs35l41_hda_remove() return void (bsc#1203699).\n- ALSA: hda: cs35l41: Make use of the helper function dev_err_probe() (bsc#1203699).\n- ALSA: hda: cs35l41: Move boost config to initialization code (bsc#1203699).\n- ALSA: hda: cs35l41: Move cs35l41* calls to its own symbol namespace (bsc#1203699).\n- ALSA: hda: cs35l41: Move external boost handling to lib for ASoC use (bsc#1203699).\n- ALSA: hda: cs35l41: Mute the device before shutdown (bsc#1203699).\n- ALSA: hda: cs35l41: Put the device into safe mode for external boost (bsc#1203699).\n- ALSA: hda: cs35l41: Read Speaker Calibration data from UEFI variables (bsc#1203699).\n- ALSA: hda: cs35l41: Remove Set Channel Map api from binding (bsc#1203699).\n- ALSA: hda: cs35l41: Remove cs35l41_hda_reg_sequence struct (bsc#1203699).\n- ALSA: hda: cs35l41: Remove suspend/resume hda hooks (bsc#1203699).\n- ALSA: hda: cs35l41: Reorganize log for playback actions (bsc#1203699).\n- ALSA: hda: cs35l41: Save Subsystem ID inside CS35L41 Driver (bsc#1203699).\n- ALSA: hda: cs35l41: Save codec object inside component struct (bsc#1203699).\n- ALSA: hda: cs35l41: Set Speaker Position for CLSA0100 Laptop (bsc#1203699).\n- ALSA: hda: cs35l41: Support CLSA0101 (bsc#1203699).\n- ALSA: hda: cs35l41: Support Firmware switching and reloading (bsc#1203699).\n- ALSA: hda: cs35l41: Support Hibernation during Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support Speaker ID for laptops (bsc#1203699).\n- ALSA: hda: cs35l41: Support System Suspend (bsc#1203699).\n- ALSA: hda: cs35l41: Support multiple load paths for firmware (bsc#1203699).\n- ALSA: hda: cs35l41: Support reading subsystem id from ACPI (bsc#1203699).\n- ALSA: hda: cs35l41: Tidyup code (bsc#1203699).\n- ALSA: hda: cs35l41: Use the CS35L41 HDA internal define (bsc#1203699).\n- ALSA: hda: cs35l41: fix double free on error in probe() (bsc#1203699).\n- ALSA: hda: fix potential memleak in 'add_widget_node' (git-fixes).\n- ALSA: hda: hda_cs_dsp_ctl: Add Library to support CS_DSP ALSA controls (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add apis to write the controls directly (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Add fw id strings (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Ensure pwr_lock is held before reading/writing controls (bsc#1203699).\n- ALSA: hda: hda_cs_dsp_ctl: Minor clean and redundant code removal (bsc#1203699).\n- ALSA: hda: intel-dsp-config: Add RaptorLake PCI IDs (jsc#PED-720).\n- ALSA: hda: intel-nhlt: Correct the handling of fmt_config flexible array (git-fixes).\n- ALSA: hiface: fix repeated words in comments (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: line6: Replace sprintf() with sysfs_emit() (git-fixes).\n- ALSA: line6: remove line6_set_raw declaration (git-fixes).\n- ALSA: oss: Fix potential deadlock at unregistration (git-fixes).\n- ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC (git-fixes).\n- ALSA: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).\n- ALSA: rme9652: use explicitly signed char (git-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett+ 8Pre support (git-fixes).\n- ALSA: scarlett2: Add support for the internal 'standalone' switch (git-fixes).\n- ALSA: scarlett2: Split scarlett2_config_items[] into 3 sections (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Add DSD support for Accuphase DAC-60 (git-fixes).\n- ALSA: usb-audio: Add endianness annotations (git-fixes).\n- ALSA: usb-audio: Add mixer mapping for Gigabyte B450/550 Mobos (git-fixes).\n- ALSA: usb-audio: Add quirk entry for M-Audio Micro (git-fixes).\n- ALSA: usb-audio: Add quirk for Behringer UMC202HD (git-fixes).\n- ALSA: usb-audio: Add quirk for LH Labs Geek Out HD Audio 1V5 (git-fixes).\n- ALSA: usb-audio: Add quirk to enable Avid Mbox 3 support (git-fixes).\n- ALSA: usb-audio: Add quirks for M-Audio Fast Track C400/600 (git-fixes).\n- ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() (git-fixes).\n- ALSA: usb-audio: Fix NULL dererence at error path (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: Fix last interface check for registration (git-fixes).\n- ALSA: usb-audio: Fix potential memory leaks (git-fixes).\n- ALSA: usb-audio: Fix regression with Dell Dock jack detection (bsc#1204719).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Register card at the last interface (git-fixes).\n- ALSA: usb-audio: Remove redundant workaround for Roland quirk (bsc#1205111).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- ALSA: usb-audio: Support jack detection on Dell dock (git-fixes).\n- ALSA: usb-audio: Turn off 'manual mode' on Dell dock (git-fixes).\n- ALSA: usb-audio: Yet more regression for for the delayed card registration (bsc#1205111).\n- ALSA: usb-audio: add quirk to fix Hamedal C20 disconnect issue (git-fixes).\n- ALSA: usb-audio: make read-only array marker static const (git-fixes).\n- ALSA: usb-audio: remove redundant assignment to variable c (git-fixes).\n- ALSA: usb-audio: scarlett2: Use struct_size() helper in scarlett2_usb() (git-fixes).\n- ALSA: usb/6fire: fix repeated words in comments (git-fixes).\n- ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow (git-fixes).\n- ARM: 9242/1: kasan: Only map modules if CONFIG_KASAN_VMALLOC=n (git-fixes).\n- ARM: 9244/1: dump: Fix wrong pg_level in walk_pmd() (git-fixes).\n- ARM: 9247/1: mm: set readonly for MT_MEMORY_RO with ARM_LPAE (git-fixes).\n- ARM: Drop CMDLINE_* dependency on ATAGS (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap3xxx_prm_late_init (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: display: Fix refcount leak bug (git-fixes).\n- ARM: OMAP2+: pdata-quirks: Fix refcount leak bug (git-fixes).\n- ARM: at91: rm9200: fix usb device clock id (git-fixes).\n- ARM: bcm: Fix refcount leak in bcm_kona_smc_init (git-fixes).\n- ARM: decompressor: Include .data.rel.ro.local (git-fixes).\n- ARM: defconfig: clean up multi_v4t and multi_v5 configs (git-fixes).\n- ARM: defconfig: drop CONFIG_PTP_1588_CLOCK=y (git-fixes).\n- ARM: defconfig: drop CONFIG_SERIAL_OMAP references (git-fixes).\n- ARM: defconfig: drop CONFIG_USB_FSL_USB2 (git-fixes).\n- ARM: dts: BCM5301X: Add DT for Meraki MR26 (git-fixes).\n- ARM: dts: am335x-pcm-953: Define fixed regulators in root node (git-fixes).\n- ARM: dts: am33xx: Fix MMCHS0 dma properties (git-fixes).\n- ARM: dts: armada-38x: Add gpio-ranges for pin muxing (git-fixes).\n- ARM: dts: ast2500-evb: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb-a1: fix board compatible (git-fixes).\n- ARM: dts: ast2600-evb: fix board compatible (git-fixes).\n- ARM: dts: at91: sam9g20ek: enable udc vbus gpio pinctrl (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: do not keep ldo2 enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d27_wlsom1: specify proper regulator output ranges (git-fixes).\n- ARM: dts: at91: sama5d2_icp: do not keep vdd_other enabled all the time (git-fixes).\n- ARM: dts: at91: sama5d2_icp: specify proper regulator output ranges (git-fixes).\n- ARM: dts: exynos: correct s5k6a3 reset polarity on Midas family (git-fixes).\n- ARM: dts: exynos: fix polarity of VBUS GPIO of Origen (git-fixes).\n- ARM: dts: fix Moxa SDIO 'compatible', remove 'sdhci' misnomer (git-fixes).\n- ARM: dts: imx6dl: add missing properties for sram (git-fixes).\n- ARM: dts: imx6q-prti6q: Fix ref/tcxo-clock-frequency properties (git-fixes).\n- ARM: dts: imx6q: add missing properties for sram (git-fixes).\n- ARM: dts: imx6qdl-gw59{10,13}: fix user pushbutton GPIO offset (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: fix spi-flash compatible (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: hook up DDC i2c bus (git-fixes).\n- ARM: dts: imx6qdl-kontron-samx6i: remove duplicated node (git-fixes).\n- ARM: dts: imx6qp: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sl: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sll: add missing properties for sram (git-fixes).\n- ARM: dts: imx6sx: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: add missing properties for sram (git-fixes).\n- ARM: dts: imx6ul: change operating-points to uint32-matrix (git-fixes).\n- ARM: dts: imx6ul: fix csi node compatible (git-fixes).\n- ARM: dts: imx6ul: fix keypad compatible (git-fixes).\n- ARM: dts: imx6ul: fix lcdif node compatible (git-fixes).\n- ARM: dts: imx6ul: fix qspi node compatible (git-fixes).\n- ARM: dts: imx7: Fix NAND controller size-cells (git-fixes).\n- ARM: dts: imx7d-colibri-emmc: add cpu1 supply (git-fixes).\n- ARM: dts: imx7d-sdb: config the max pressure for tsc2046 (git-fixes).\n- ARM: dts: imx: align SPI NOR node name with dtschema (git-fixes).\n- ARM: dts: integrator: Tag PCI host with device_type (git-fixes).\n- ARM: dts: kirkwood: lsxl: fix serial line (git-fixes).\n- ARM: dts: kirkwood: lsxl: remove first ethernet port (git-fixes).\n- ARM: dts: qcom: mdm9615: add missing PMIC GPIO reg (git-fixes).\n- ARM: dts: qcom: pm8841: add required thermal-sensor-cells (git-fixes).\n- ARM: dts: qcom: sdx55: Fix the IRQ trigger type for UART (git-fixes).\n- ARM: dts: turris-omnia: Add label for wan port (git-fixes).\n- ARM: dts: turris-omnia: Fix mpp26 pin name and comment (git-fixes).\n- ARM: dts: uniphier: Fix USB interrupts for PXs2 SoC (git-fixes).\n- ARM: findbit: fix overflowing offset (git-fixes).\n- ARM: mxs: fix memory leak in mxs_machine_init() (git-fixes).\n- ARM: shmobile: rcar-gen2: Increase refcount for new reference (git-fixes).\n- ASoC: Intel: bytcht_es8316: Add quirk for the Nanote UMPC-01 (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk variant for LAPBC710 NUC15 (git-fixes).\n- ASoC: SOF: Intel: pci-tgl: add ADL-PS support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-P support (jsc#PED-720).\n- ASoC: SOF: Intel: pci-tgl: add RPL-S support (jsc#PED-652).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: SOF: pci: Change DMI match info to support all Chrome platforms (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codec: tlv320aic32x4: fix mono playback via I2S (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: jz4725b: Fix spelling mistake 'Sourc' -> 'Source', 'Routee' -> 'Route' (git-fixes).\n- ASoC: codecs: jz4725b: add missed Line In power control bit (git-fixes).\n- ASoC: codecs: jz4725b: fix capture selector naming (git-fixes).\n- ASoC: codecs: jz4725b: fix reported volume for Master ctl (git-fixes).\n- ASoC: codecs: jz4725b: use right control for Capture Volume (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: tx-macro: fix kcontrol put (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: core: Fix use-after-free in snd_soc_exit() (git-fixes).\n- ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe (git-fixes).\n- ASoC: cs35l41: Add ASP TX3/4 source to register patch (bsc#1203699).\n- ASoC: cs35l41: Add bindings for CS35L41 (bsc#1203699).\n- ASoC: cs35l41: Add common cs35l41 enter hibernate function (bsc#1203699).\n- ASoC: cs35l41: Add cs35l51/53 IDs (bsc#1203699).\n- ASoC: cs35l41: Add endianness flag in snd_soc_component_driver (bsc#1203699).\n- ASoC: cs35l41: Add one more variable in the debug log (bsc#1203699).\n- ASoC: cs35l41: Add support for CLSA3541 ACPI device ID (bsc#1203699).\n- ASoC: cs35l41: Add support for hibernate memory retention mode (bsc#1203699).\n- ASoC: cs35l41: Binding fixes (bsc#1203699).\n- ASoC: cs35l41: CS35L41 Boosted Smart Amplifier (bsc#1203699).\n- ASoC: cs35l41: Change monitor widgets to siggens (bsc#1203699).\n- ASoC: cs35l41: Combine adjacent register writes (bsc#1203699).\n- ASoC: cs35l41: Convert tables to shared source code (bsc#1203699).\n- ASoC: cs35l41: Correct DSP power down (bsc#1203699).\n- ASoC: cs35l41: Correct handling of some registers in the cache (bsc#1203699).\n- ASoC: cs35l41: Correct some control names (bsc#1203699).\n- ASoC: cs35l41: Create shared function for boost configuration (bsc#1203699).\n- ASoC: cs35l41: Create shared function for errata patches (bsc#1203699).\n- ASoC: cs35l41: Create shared function for setting channels (bsc#1203699).\n- ASoC: cs35l41: DSP Support (bsc#1203699).\n- ASoC: cs35l41: Do not overwrite returned error code (bsc#1203699).\n- ASoC: cs35l41: Do not print error when waking from hibernation (bsc#1203699).\n- ASoC: cs35l41: Document CS35l41 External Boost (bsc#1203699).\n- ASoC: cs35l41: Fix DSP mbox start command and global enable order (bsc#1203699).\n- ASoC: cs35l41: Fix GPIO2 configuration (bsc#1203699).\n- ASoC: cs35l41: Fix a bunch of trivial code formating/style issues (bsc#1203699).\n- ASoC: cs35l41: Fix a shift-out-of-bounds warning found by UBSAN (bsc#1203699).\n- ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t (bsc#1203699).\n- ASoC: cs35l41: Fix link problem (bsc#1203699).\n- ASoC: cs35l41: Fix max number of TX channels (bsc#1203699).\n- ASoC: cs35l41: Fix undefined reference to core functions (bsc#1203699).\n- ASoC: cs35l41: Fix use of an uninitialised variable (bsc#1203699).\n- ASoC: cs35l41: Fixup the error messages (bsc#1203699).\n- ASoC: cs35l41: Make cs35l41_remove() return void (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 exit hibernate function into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41 fs errata into shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_otp_unpack to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs35l41_set_cspl_mbox_cmd to shared code (bsc#1203699).\n- ASoC: cs35l41: Move cs_dsp config struct into shared code (bsc#1203699).\n- ASoC: cs35l41: Move power initializations to reg_sequence (bsc#1203699).\n- ASoC: cs35l41: Read System Name from ACPI _SUB to identify firmware (bsc#1203699).\n- ASoC: cs35l41: Remove incorrect comment (bsc#1203699).\n- ASoC: cs35l41: Remove unnecessary param (bsc#1203699).\n- ASoC: cs35l41: Set the max SPI speed for the whole device (bsc#1203699).\n- ASoC: cs35l41: Support external boost (bsc#1203699).\n- ASoC: cs35l41: Update handling of test key registers (bsc#1203699).\n- ASoC: cs35l41: Use regmap_read_poll_timeout to wait for OTP boot (bsc#1203699).\n- ASoC: cs42l42: Add control for audio slow-start switch (bsc#1203699).\n- ASoC: cs42l42: Add warnings about DETECT_MODE and PLL_START (bsc#1203699).\n- ASoC: cs42l42: Allow time for HP/ADC to power-up after enable (bsc#1203699).\n- ASoC: cs42l42: Always enable TS_PLUG and TS_UNPLUG interrupts (bsc#1203699).\n- ASoC: cs42l42: Change jack_detect_mutex to a lock of all IRQ handling (bsc#1203699).\n- ASoC: cs42l42: Do not claim to support 192k (bsc#1203699).\n- ASoC: cs42l42: Do not reconfigure the PLL while it is running (bsc#1203699).\n- ASoC: cs42l42: Fix WARN in remove() if running without an interrupt (bsc#1203699).\n- ASoC: cs42l42: Handle system suspend (bsc#1203699).\n- ASoC: cs42l42: Implement Manual Type detection as fallback (bsc#1203699).\n- ASoC: cs42l42: Mark OSC_SWITCH_STATUS register volatile (bsc#1203699).\n- ASoC: cs42l42: Minor fix all errors reported by checkpatch.pl script (bsc#1203699).\n- ASoC: cs42l42: Move CS42L42 register descriptions to general include (bsc#1203699).\n- ASoC: cs42l42: Only report button state if there was a button interrupt (git-fixes).\n- ASoC: cs42l42: Prevent NULL pointer deref in interrupt handler (bsc#1203699).\n- ASoC: cs42l42: Remove redundant pll_divout member (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to DETECT_MODE (bsc#1203699).\n- ASoC: cs42l42: Remove redundant writes to RS_PLUG/RS_UNPLUG masks (bsc#1203699).\n- ASoC: cs42l42: Remove unused runtime_suspend/runtime_resume callbacks (bsc#1203699).\n- ASoC: cs42l42: Report full jack status when plug is detected (bsc#1203699).\n- ASoC: cs42l42: Report initial jack state (bsc#1203699).\n- ASoC: cs42l42: Reset and power-down on remove() and failed probe() (bsc#1203699).\n- ASoC: cs42l42: Set correct SRC MCLK (bsc#1203699).\n- ASoC: cs42l42: Simplify reporting of jack unplug (bsc#1203699).\n- ASoC: cs42l42: Use PLL for SCLK > 12.288MHz (bsc#1203699).\n- ASoC: cs42l42: Use two thresholds and increased wait time for manual type detection (bsc#1203699).\n- ASoC: cs42l42: free_irq() before powering-down on probe() fail (bsc#1203699).\n- ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() (git-fixes).\n- ASoC: dt-bindings: cs42l42: Convert binding to yaml (bsc#1203699).\n- ASoC: eureka-tlv320: Hold reference returned from of_find_xxx API (git-fixes).\n- ASoC: fsl-asoc-card: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_asrc fsl_esai fsl_sai: allow CONFIG_PM=N (git-fixes).\n- ASoC: fsl_asrc: force cast the asrc_format type (git-fixes).\n- ASoC: fsl_easrc: use snd_pcm_format_t type for sample_format (git-fixes).\n- ASoC: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).\n- ASoC: fsl_sai: use local device pointer (git-fixes).\n- ASoC: imx-audmux: Silence a clang warning (git-fixes).\n- ASoC: imx-card: Fix DSD/PDM mclk frequency (git-fixes).\n- ASoC: imx-card: Fix refcount issue with of_node_put (git-fixes).\n- ASoC: imx-card: use snd_pcm_format_t type for asrc_format (git-fixes).\n- ASoC: max98373: Add checks for devm_kcalloc (git-fixes).\n- ASoC: mchp-spdifrx: disable end of block interrupt on failures (git-fixes).\n- ASoC: mchp-spdiftx: Fix clang -Wbitfield-constant-conversion (git-fixes).\n- ASoC: mchp-spdiftx: remove references to mchp_i2s_caps (git-fixes).\n- ASoC: mt6359: Fix refcount leak bug (git-fixes).\n- ASoC: mt6359: fix tests for platform_get_irq() failure (git-fixes).\n- ASoC: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe (git-fixes).\n- ASoC: mt6660: Keep the pm_runtime enables before component stuff in mt6660_i2c_probe (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: nau8824: Fix semaphore unbalance at error paths (git-fixes).\n- ASoC: ops: Fix bounds check for _sx controls (git-fixes).\n- ASoC: qcom: Fix missing of_node_put() in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- ASoC: qcom: lpass-cpu: Mark HDMI TX parity register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: mark HDMI TX registers as volatile (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: qcom: sm8250: add missing module owner (git-fixes).\n- ASoC: rsnd: Add check for rsnd_mod_power_on (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_irq_ctrl() (git-fixes).\n- ASoC: rt1019: Fix the TDM settings (git-fixes).\n- ASoC: samsung: Fix error handling in aries_audio_probe (git-fixes).\n- ASoC: samsung: change gpiod_speaker_power and rx1950_audio from global to static variables (git-fixes).\n- ASoC: samsung: change neo1973_audio from a global to static (git-fixes).\n- ASoC: samsung: h1940_uda1380: include proepr GPIO consumer header (git-fixes).\n- ASoC: sgtl5000: Reset the CHIP_CLK_CTRL reg on remove (git-fixes).\n- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).\n- ASoC: soc-utils: Remove __exit for snd_soc_util_exit() (git-fixes).\n- ASoC: stm32: dfsdm: manage cb buffers cleanup (git-fixes).\n- ASoC: tas2764: Allow mono streams (git-fixes).\n- ASoC: tas2764: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2764: Fix mute/unmute (git-fixes).\n- ASoC: tas2764: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ASoC: tas2770: Drop conflicting set_bias_level power setting (git-fixes).\n- ASoC: tas2770: Fix handling of mute/unmute (git-fixes).\n- ASoC: tas2770: Fix set_tdm_slot in case of single slot (git-fixes).\n- ASoC: tas2770: Reinit regcache on reset (git-fixes).\n- ASoC: tas2770: Set correct FSYNC polarity (git-fixes).\n- ASoC: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).\n- ASoC: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).\n- ASoC: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).\n- ASoC: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).\n- ASoC: wm8962: Add an event handler for TEMP_HP and TEMP_SPK (git-fixes).\n- ASoC: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).\n- ASoC: wm_adsp: Add support for 'toggle' preloaders (bsc#1203699).\n- ASoC: wm_adsp: Add trace caps to speaker protection FW (bsc#1203699).\n- ASoC: wm_adsp: Cancel ongoing work when removing controls (bsc#1203699).\n- ASoC: wm_adsp: Compressed stream DSP memory structs should be __packed (bsc#1203699).\n- ASoC: wm_adsp: Correct control read size when parsing compressed buffer (bsc#1203699).\n- ASoC: wm_adsp: Expand firmware loading search options (bsc#1203699).\n- ASoC: wm_adsp: Fix event for preloader (bsc#1203699).\n- ASoC: wm_adsp: Handle optional legacy support (git-fixes).\n- ASoC: wm_adsp: Introduce cs_dsp logging macros (bsc#1203699).\n- ASoC: wm_adsp: Make compressed buffers optional (bsc#1203699).\n- ASoC: wm_adsp: Minor clean and redundant code removal (bsc#1203699).\n- ASoC: wm_adsp: Move check for control existence (bsc#1203699).\n- ASoC: wm_adsp: Move check of dsp->running to better place (bsc#1203699).\n- ASoC: wm_adsp: Move sys_config_size to wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Pass firmware names as parameters when starting DSP core (bsc#1203699).\n- ASoC: wm_adsp: Remove pointless string comparison (bsc#1203699).\n- ASoC: wm_adsp: Remove the wmfw_add_ctl helper function (bsc#1203699).\n- ASoC: wm_adsp: Remove use of snd_ctl_elem_type_t (bsc#1203699).\n- ASoC: wm_adsp: Rename generic DSP support (bsc#1203699).\n- ASoC: wm_adsp: Separate generic cs_dsp_coeff_ctl handling (bsc#1203699).\n- ASoC: wm_adsp: Separate some ASoC and generic functions (bsc#1203699).\n- ASoC: wm_adsp: Separate wm_adsp specifics in cs_dsp_client_ops (bsc#1203699).\n- ASoC: wm_adsp: Split DSP power operations into helper functions (bsc#1203699).\n- ASoC: wm_adsp: Split out struct cs_dsp from struct wm_adsp (bsc#1203699).\n- ASoC: wm_adsp: Switch to using wm_coeff_read_ctrl for compressed buffers (bsc#1203699).\n- ASoC: wm_adsp: move firmware loading to client (bsc#1203699).\n- ASoC: wm_adsp: remove a repeated including (bsc#1203699).\n- ASoC: wm_adsp: wm_adsp_control_add() error: uninitialized symbol 'ret' (bsc#1203699).\n- Bluetooth: 6LoWPAN: add missing hci_dev_put() in get_l2cap_conn() (git-fixes).\n- Bluetooth: Add bt_skb_sendmmsg helper (git-fixes).\n- Bluetooth: Add bt_skb_sendmsg helper (git-fixes).\n- Bluetooth: Fix bt_skb_sendmmsg not allocating partial chunks (git-fixes).\n- Bluetooth: Fix not cleanup led when bt_init fails (git-fixes).\n- Bluetooth: Fix passing NULL to PTR_ERR (git-fixes).\n- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM (git-fixes).\n- Bluetooth: L2CAP: Fix attempting to access uninitialized memory (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu (git-fixes).\n- Bluetooth: L2CAP: Fix user-after-free (git-fixes).\n- Bluetooth: L2CAP: initialize delayed works at l2cap_chan_create() (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- Bluetooth: RFCOMM: Fix possible deadlock on socket shutdown/release (git-fixes).\n- Bluetooth: RFCOMM: Replace use of memcpy_from_msg with bt_skb_sendmmsg (git-fixes).\n- Bluetooth: SCO: Fix sco_send_frame returning skb->len (git-fixes).\n- Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg (git-fixes).\n- Bluetooth: btintel: Mark Intel controller to support LE_STATES quirk (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586 (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587 (git-fixes).\n- Bluetooth: btusb: Add support of IMC Networks PID 0x3568 (git-fixes).\n- Bluetooth: btusb: mediatek: fix WMT failure during runtime suspend (git-fixes).\n- Bluetooth: hci_bcm: Add BCM4349B1 variant (git-fixes).\n- Bluetooth: hci_bcm: Add DT compatible for CYW55572 (git-fixes).\n- Bluetooth: hci_core: Fix not handling link timeouts propertly (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (git-fixes).\n- Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure (git-fixes).\n- Bluetooth: virtio_bt: Use skb_put to set length (git-fixes).\n- Decrease the number of SMB3 smbdirect client SGEs (bsc#1193629).\n- Documentation: ACPI: EINJ: Fix obsolete example (git-fixes).\n- Documentation: PM: Drop pme_interrupt reference (git-fixes).\n- Documentation: add description for net.core.gro_normal_batch (git-fixes).\n- Documentation: add description for net.sctp.ecn_enable (git-fixes).\n- Documentation: add description for net.sctp.intl_enable (git-fixes).\n- Documentation: add description for net.sctp.reconf_enable (git-fixes).\n- Documentation: devres: add missing I2C helper (git-fixes).\n- Documentation: dm writecache: Render status list as list (git-fixes).\n- Documentation: fix sctp_wmem in ip-sysctl.rst (git-fixes).\n- Documentation: fix udp_wmem_min in ip-sysctl.rst (git-fixes).\n- Documentation: move watch_queue to core-api (git-fixes).\n- Documentation: siphash: Fix typo in the name of offsetofend macro (git-fixes).\n- Drivers: hv: Always reserve framebuffer region for Gen1 VMs (git-fixes).\n- Drivers: hv: Fix syntax errors in comments (git-fixes).\n- Drivers: hv: Never allocate anything besides framebuffer from framebuffer memory region (git-fixes).\n- Drivers: hv: fix repeated words in comments (git-fixes).\n- Drivers: hv: remove duplicate word in a comment (git-fixes).\n- Drivers: hv: vmbus: Accept hv_sock offers in isolated guests (git-fixes).\n- Drivers: hv: vmbus: Add VMbus IMC device to unsupported list (git-fixes).\n- Drivers: hv: vmbus: Do not wait for the ACPI device upon initialization (git-fixes).\n- Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero (bsc#1204017).\n- Drivers: hv: vmbus: Fix kernel-doc (git-fixes).\n- Drivers: hv: vmbus: Introduce vmbus_request_addr_match() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce vmbus_sendpacket_getid() (bsc#1204017).\n- Drivers: hv: vmbus: Introduce {lock,unlock}_requestor() (bsc#1204017).\n- Drivers: hv: vmbus: Optimize vmbus_on_event (git-fixes).\n- Drivers: hv: vmbus: Release cpu lock in error case (git-fixes).\n- Drivers: hv: vmbus: Use PCI_VENDOR_ID_MICROSOFT for better discoverability (git-fixes).\n- Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work() (git-fixes).\n- Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register() (git-fixes).\n- Drivers: hv: vmbus: fix typo in comment (git-fixes).\n- EDAC/dmc520: Do not print an error for each unconfigured interrupt line (bsc#1190497).\n- EDAC/ghes: Set the DIMM label unconditionally (bsc#1201768).\n- Enable livepatching related packages on -RT (jsc#PED-1706)\n- HID: AMD_SFH: Add a DMI quirk entry for Chromebooks (git-fixes).\n- HID: add Lenovo Yoga C630 battery quirk (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: amd_sfh: Add NULL check for hid device (git-fixes).\n- HID: amd_sfh: Handle condition of 'no sensors' (git-fixes).\n- HID: asus: ROG NKey: Ignore portion of 0x5a report (git-fixes).\n- HID: core: fix shift-out-of-bounds in hid_report_raw_event (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: hid-input: add Surface Go battery quirk (git-fixes).\n- HID: hid-lg4ff: Add check for empty lbuf (git-fixes).\n- HID: hidraw: fix memory leak in hidraw_release() (git-fixes).\n- HID: hyperv: fix possible memory leak in mousevsc_probe() (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- HID: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).\n- HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() (git-fixes).\n- HID: multitouch: Add memory barriers (git-fixes).\n- HID: multitouch: new device class fix Lenovo X12 trackpad sticky (git-fixes).\n- HID: playstation: add initial DualSense Edge controller support (git-fixes).\n- HID: roccat: Fix use-after-free in roccat_read() (git-fixes).\n- HID: saitek: add madcatz variant of MMO7 mouse device ID (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fies).\n- HID: thrustmaster: Add sparco wheel and fix array length (git-fixes).\n- HID: usbhid: Add ALWAYS_POLL quirk for some mice (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- HSI: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).\n- HSI: omap_ssi_port: Fix dma_map_sg error check (git-fixes).\n- Handle variable number of SGEs in client smbdirect send (bsc#1193629).\n- IB/core: Fix a nested dead lock as part of ODP flow (git-fixes)\n- IB/hfi1: Correctly move list in sc_disable() (git-fixes)\n- IB/rdmavt: Add __init/__exit annotations to module init/exit funcs (git-fixes)\n- IB: Set IOVA/LENGTH on IB_MR in core/uverbs layers (git-fixes)\n- Input: exc3000 - fix return value check of wait_for_completion_timeout (git-fixes).\n- Input: goodix - add compatible string for GT1158 (git-fixes).\n- Input: goodix - add support for GT1158 (git-fixes).\n- Input: goodix - try resetting the controller when no config is set (git-fixes).\n- Input: gscps2 - check return value of ioremap() in gscps2_probe() (git-fixes).\n- Input: i8042 - add TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - add additional TUXEDO devices to i8042 quirk tables (git-fies).\n- Input: i8042 - fix leaking of platform device on module removal (git-fixes).\n- Input: i8042 - fix refount leak on sparc (git-fixes).\n- Input: i8042 - merge quirk tables (git-fies).\n- Input: i8042 - move __initconst to fix code styling warning (git-fies).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: iforce - invert valid length check when fetching device IDs (git-fixes).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: iqs62x-keys - drop unused device node references (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send() (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- Input: soc_button_array - add Acer Switch V 10 to dmi_use_low_level_irq[] (git-fixes).\n- Input: soc_button_array - add use_low_level_irq module parameter (git-fixes).\n- Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode (git-fixes).\n- Input: synaptics-rmi4 - fix firmware update operations with bootloader v8 (git-fixes).\n- Input: xpad - add supported devices as contributed on github (git-fixes).\n- Input: xpad - fix wireless 360 controller breaking after suspend (git-fixes).\n- KABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- KEYS: asymmetric: enforce SM2 signature use pkey algo (git-fixes).\n- KVM-x86-Avoid-theoretical-NULL-pointer-dereference-i.patch\n- KVM-x86-Check-lapic_in_kernel-before-attempting-to-s.patch\n- KVM-x86-Forbid-VMM-to-set-SYNIC-STIMER-MSRs-when-Syn.patch\n- KVM: LAPIC: Also cancel preemption timer during SET_LAPIC (git-fixes).\n- KVM: MMU: shadow nested paging does not have PKU (git-fixes).\n- KVM: Move wiping of the kvm->vcpus array to common code (git-fixes).\n- KVM: PPC: Book3S HV: Check return value of kvmppc_radix_init (bsc#1194869).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Remove kvmhv_p9_[set,restore]_lpcr declarations (bsc#1194869).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator (bsc#1194869).\n- KVM: PPC: Book3s HV: Remove unused function kvmppc_bad_interrupt (bsc#1194869).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: SEV: Mark nested locking of vcpu->lock (git-fixes).\n- KVM: SVM: Create a separate mapping for the GHCB save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Create a separate mapping for the SEV-ES save area (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Define sev_features and VMPL field in the VMSA (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: Disable SEV-ES support if MMIO caching is disable (git-fixes).\n- KVM: SVM: Do not BUG if userspace injects an interrupt with GIF=0 (git-fixes).\n- KVM: SVM: Do not intercept #GP for SEV guests (git-fixes).\n- KVM: SVM: Exit to userspace on ENOMEM/EFAULT GHCB errors (git-fixes).\n- KVM: SVM: Stuff next_rip on emulated INT3 injection if NRIPS is supported (git-fixes).\n- KVM: SVM: Unwind 'speculative' RIP advancement if INTn injection 'fails' (git-fixes).\n- KVM: SVM: Update the SEV-ES save area mapping (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: SVM: adjust register allocation for __svm_vcpu_run() (git-fixes).\n- KVM: SVM: fix panic on out-of-bounds guest IRQ (git-fixes).\n- KVM: SVM: fix tsc scaling cache logic (bsc#1203263).\n- KVM: SVM: move guest vmsave/vmload back to assembly (git-fixes).\n- KVM: SVM: replace regs argument of __svm_vcpu_run() with vcpu_svm (git-fixes).\n- KVM: SVM: retrieve VMCB from assembly (git-fixes).\n- KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL (git-fixes).\n- KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS (git-fixes).\n- KVM: VMX: Heed the 'msr' argument in msr_write_intercepted() (git-fixes).\n- KVM: VMX: Inject #PF on ENCLS as 'emulated' #PF (git-fixes).\n- KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there's no vPMU (git-fixes).\n- KVM: VMX: Print VM-instruction error as unsigned (git-fixes).\n- KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled (bsc#1205007).\n- KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable (git-fixes).\n- KVM: VMX: prepare sync_pir_to_irr for running with APICv disabled (git-fixes).\n- KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlock (git-fixes).\n- KVM: X86: Fix when shadow_root_level=5 && guest root_level<4 (git-fixes).\n- KVM: X86: Use vcpu->arch.walk_mmu for kvm_mmu_invlpg() (git-fixes).\n- KVM: X86: avoid uninitialized 'fault.async_page_fault' from fixed-up #PF (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: fix avic_set_running for preemptable kernels (git-fixes).\n- KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1 (git-fixes).\n- KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists (git-fixes).\n- KVM: nVMX: Defer APICv updates while L2 is active until L1 is active (git-fixes).\n- KVM: nVMX: Ignore SIPI that arrives in L2 when vCPU is not in WFS (git-fixes).\n- KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4 (git-fixes).\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}() (git-fixes).\n- KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required (git-fixes).\n- KVM: nVMX: Unconditionally purge queued/injected events on nested 'exit' (git-fixes).\n- KVM: nVMX: do not use vcpu->arch.efer when checking host state on nested state load (git-fixes).\n- KVM: s390: Add a routine for setting userspace CPU state (git-fixes jsc#PED-611).\n- KVM: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).\n- KVM: s390: Simplify SIGP Set Arch handling (git-fixes jsc#PED-611).\n- KVM: s390: pv: do not allow userspace to set the clock under PV (git-fixes).\n- KVM: s390: pv: do not present the ecall interrupt twice (bsc#1203229 LTC#199905).\n- KVM: s390: pv: leak the topmost page table when destroy fails (git-fixes).\n- KVM: s390x: fix SCK locking (git-fixes).\n- KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE (git-fixes).\n- KVM: selftests: Silence compiler warning in the kvm_page_table_test (git-fixes).\n- KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibility (git-fixes).\n- KVM: x86/mmu: Do not advance iterator after restart due to yielding (git-fixes).\n- KVM: x86/mmu: Do not freak out if pml5_root is NULL on 4-level host (git-fixes).\n- KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap (git-fixes).\n- KVM: x86/mmu: Move 'invalid' check out of kvm_tdp_mmu_get_root() (git-fixes).\n- KVM: x86/mmu: Retry page fault if root is invalidated by memslot update (git-fixes).\n- KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non-atomic path (git-fixes).\n- KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU (git-fixes).\n- KVM: x86/mmu: fix memoryleak in kvm_mmu_vendor_module_init() (git-fixes).\n- KVM: x86/mmu: include EFER.LMA in extended mmu role (git-fixes).\n- KVM: x86/mmu: make apf token non-zero to fix bug (git-fixes).\n- KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}() (git-fixes).\n- KVM: x86/pmu: Do not truncate the PerfEvtSeln MSR when creating a perf event (git-fixes).\n- KVM: x86/pmu: Fix and isolate TSX-specific performance event logic (git-fixes).\n- KVM: x86/pmu: Fix available_event_types check for REF_CPU_CYCLES event (git-fixes).\n- KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).\n- KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog (git-fixes).\n- KVM: x86/pmu: Use different raw event masks for AMD and Intel (git-fixes).\n- KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id (git-fixes).\n- KVM: x86: Add KVM_CAP_ENABLE_CAP to x86 (git-fixes).\n- KVM: x86: Add compat handler for KVM_X86_SET_MSR_FILTER (git-fixes).\n- KVM: x86: Always set kvm_run->if_flag (git-fixes).\n- KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() (git-fixes).\n- KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq (git-fixes).\n- KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated (git-fixes).\n- KVM: x86: Forcibly leave nested virt when SMM state is toggled (git-fixes).\n- KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op() (git-fixes).\n- KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest (git-fixes).\n- KVM: x86: Inject #UD on emulated XSETBV if XSAVES isn't enabled (git-fixes).\n- KVM: x86: Keep MSR_IA32_XSS unchanged for INIT (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000001H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000006H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.80000008H (git-fixes).\n- KVM: x86: Mask off reserved bits in CPUID.8000001AH (git-fixes).\n- KVM: x86: Move lookup of indexed CPUID leafs to helper (jsc#SLE-19924, jsc#SLE-24814).\n- KVM: x86: Register perf callbacks after calling vendor's hardware_setup() (git-fixes).\n- KVM: x86: Report error when setting CPUID if Hyper-V allocation fails (git-fixes).\n- KVM: x86: Retry page fault if MMU reload is pending and root has no sp (bsc#1205744).\n- KVM: x86: SVM: do not passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS) (git-fixes).\n- KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time (git-fixes).\n- KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1) (git-fixes).\n- KVM: x86: Update vPMCs when retiring branch instructions (git-fixes).\n- KVM: x86: Update vPMCs when retiring instructions (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses (git-fixes).\n- KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits (git-fixes).\n- KVM: x86: avoid loading a vCPU after .vm_destroy was called (git-fixes).\n- KVM: x86: check PIR even for vCPUs with disabled APICv (git-fixes).\n- KVM: x86: do not report preemption if the steal time cache is stale (git-fixes).\n- KVM: x86: emulator: em_sysexit should update ctxt->mode (git-fixes).\n- KVM: x86: emulator: introduce emulator_recalc_and_set_mode (git-fixes).\n- KVM: x86: emulator: update the emulation mode after CR0 write (git-fixes).\n- KVM: x86: emulator: update the emulation mode after rsm (git-fixes).\n- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb() (git-fixes).\n- KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_send_ipi() (git-fixes).\n- KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercall (git-fixes).\n- KVM: x86: ignore APICv if LAPIC is not enabled (git-fixes).\n- KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSM (git-fixes).\n- KVM: x86: nSVM: fix potential NULL derefernce on nested migration (git-fixes).\n- KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved state (git-fixes).\n- KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all (git-fixes).\n- KVM: x86: revalidate steal time cache if MSR value changes (git-fixes).\n- KVM: x86: use a separate asm-offsets.c file (git-fixes).\n- MIPS: Loongson: Use hwmon_device_register_with_groups() to register hwmon (git-fixes).\n- NFC: nci: Bounds check struct nfc_target arrays (git-fixes).\n- NFC: nci: fix memory leak in nci_rx_data_packet() (git-fixes).\n- NFS: Fix WARN_ON due to unionization of nfs_inode.nrequests (git-fixes).\n- NFS: Fix another fsync() issue after a server reboot (git-fixes).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Clean up the show_nf_flags() macro (git-fixes).\n- NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (git-fixes).\n- NFSD: Fix ia_size underflow (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NFSD: restore EINVAL error translation in nfsd_commit() (git-fixes).\n- NFSv4.1: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFSv4.1: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFSv4.1: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFSv4.2 fix problems with __nfs42_ssc_open (git-fixes).\n- NFSv4.2: Update mode bits after ALLOCATE and DEALLOCATE (git-fixes).\n- NFSv4: Fix races in the legacy idmapper upcall (git-fixes).\n- NFSv4: Fixes for nfs4_inode_return_delegation() (git-fixes).\n- NFSv4: Turn off open-by-filehandle and NFS re-export for NFSv4.0 (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/AER: Iterate over error counters instead of error strings (git-fixes).\n- PCI/ASPM: Correct LTR_L1.2_THRESHOLD computation (git-fixes).\n- PCI/ASPM: Ignore L1 PM Substates if device lacks capability (git-fixes).\n- PCI/ASPM: Make Intel DG2 L1 acceptable latency unlimited (jsc#PED-387).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: Correct misspelled words (git-fixes).\n- PCI: Disable MSI for Tegra234 Root Ports (git-fixes).\n- PCI: Fix used_buses calculation in pci_scan_child_bus_extend() (git-fixes).\n- PCI: Move PCI_VENDOR_ID_MICROSOFT/PCI_DEVICE_ID_HYPERV_VIDEO definitions to pci_ids.h (git-fixes).\n- PCI: Prefer 'unsigned int' over bare 'unsigned' (git-fixes).\n- PCI: Sanitise firmware BAR assignments behind a PCI-PCI bridge (git-fixes).\n- PCI: aardvark: Fix reporting Slot capabilities on emulated bridge (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Set INCREASE_REGION_SIZE flag based on limit address (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: endpoint: Do not stop controller when unbinding endpoint function (git-fixes).\n- PCI: hv: Add validation for untrusted Hyper-V values (git-fixes).\n- PCI: hv: Fix synchronization between channel callback and hv_compose_msi_msg() (bsc#1204017).\n- PCI: hv: Fix synchronization between channel callback and hv_pci_bus_exit() (bsc#1204017).\n- PCI: hv: Fix the definition of vector in hv_compose_msi_msg() (git-fixes).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Use vmbus_requestor to generate transaction IDs for VMbus hardening (bsc#1204017).\n- PCI: mediatek-gen3: Change driver name to mtk-pcie-gen3 (git-fixes).\n- PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains() (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PM: domains: Ensure genpd_debugfs_dir exists before remove (git-fixes).\n- PM: domains: Fix handling of unavailable/disabled idle states (git-fixes).\n- PM: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).\n- PM: hibernate: defer device probing when resuming from hibernation (git-fixes).\n- RDMA/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)\n- RDMA/cm: Use SLID in the work completion as the DLID in responder side (git-fixes)\n- RDMA/cma: Fix arguments order in net device validation (git-fixes)\n- RDMA/cma: Use output interface for net_dev check (git-fixes)\n- RDMA/core: Fix null-ptr-deref in ib_core_cleanup() (git-fixes)\n- RDMA/hfi1: Fix potential integer multiplication overflow errors (git-fixes)\n- RDMA/hfi1: Prevent panic when SDMA is disabled (git-fixes)\n- RDMA/hfi1: Prevent use of lock before it is initialized (git-fixes)\n- RDMA/hfi1: fix potential memory leak in setup_base_ctxt() (git-fixes)\n- RDMA/hns: Add the detection for CMDQ status in the device initialization process (git-fixes)\n- RDMA/hns: Correct the type of variables participating in the shift operation (git-fixes)\n- RDMA/hns: Disable local invalidate operation (git-fixes)\n- RDMA/hns: Fix incorrect clearing of interrupt status register (git-fixes)\n- RDMA/hns: Fix supported page size (git-fixes)\n- RDMA/hns: Fix wrong fixed value of qp->rq.wqe_shift (git-fixes)\n- RDMA/hns: Remove magic number (git-fixes)\n- RDMA/hns: Remove the num_cqc_timer variable (git-fixes)\n- RDMA/hns: Remove the num_qpc_timer variable (git-fixes)\n- RDMA/hns: Remove unnecessary check for the sgid_attr when modifying QP (git-fixes)\n- RDMA/hns: Replace tab with space in the right-side comments (git-fixes)\n- RDMA/hns: Use hr_reg_xxx() instead of remaining roce_set_xxx() (git-fixes)\n- RDMA/irdma: Add support for address handle re-use (git-fixes)\n- RDMA/irdma: Align AE id codes to correct flush code and event (git-fixes)\n- RDMA/irdma: Do not advertise 1GB page size for x722 (git-fixes)\n- RDMA/irdma: Fix VLAN connection with wildcard address (git-fixes)\n- RDMA/irdma: Fix a window for use-after-free (git-fixes)\n- RDMA/irdma: Fix deadlock in irdma_cleanup_cm_core() (git-fixes)\n- RDMA/irdma: Fix setting of QP context err_rq_idx_valid field (git-fixes)\n- RDMA/irdma: Fix sleep from invalid context BUG (git-fixes)\n- RDMA/irdma: Move union irdma_sockaddr to header file (git-fixes)\n- RDMA/irdma: Remove the unnecessary variable saddr (git-fixes)\n- RDMA/irdma: Report RNR NAK generation in device caps (git-fixes)\n- RDMA/irdma: Report the correct max cqes from query device (git-fixes)\n- RDMA/irdma: Return correct WC error for bind operation failure (git-fixes)\n- RDMA/irdma: Return error on MR deregister CQP failure (git-fixes)\n- RDMA/irdma: Use net_type to check network type (git-fixes)\n- RDMA/irdma: Use s/g array in post send only when its valid (git-fixes)\n- RDMA/irdma: Validate udata inlen and outlen (git-fixes)\n- RDMA/mlx5: Add missing check for return value in get namespace flow (git-fixes)\n- RDMA/mlx5: Do not compare mkey tags in DEVX indirect mkey (git-fixes)\n- RDMA/mlx5: Set local port to one when accessing counters (git-fixes)\n- RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)\n- RDMA/qedr: Fix reporting QP timeout attribute (git-fixes)\n- RDMA/qedr: clean up work queue on failure in qedr_alloc_resources() (git-fixes)\n- RDMA/rtrs-clt: Use the right sg_cnt after ib_dma_map_sg (git-fixes)\n- RDMA/rtrs-srv: Fix modinfo output for stringify (git-fixes)\n- RDMA/rxe: Fix 'kernel NULL pointer dereference' error (git-fixes)\n- RDMA/rxe: Fix deadlock in rxe_do_local_ops() (git-fixes)\n- RDMA/rxe: Fix error unwind in rxe_create_qp() (git-fixes)\n- RDMA/rxe: Fix mw bind to allow any consumer key portion (git-fixes)\n- RDMA/rxe: Fix resize_finish() in rxe_queue.c (git-fixes)\n- RDMA/rxe: Fix rnr retry behavior (git-fixes)\n- RDMA/rxe: Fix the error caused by qp->sk (git-fixes)\n- RDMA/rxe: For invalidate compare according to set keys in mr (git-fixes)\n- RDMA/rxe: Generate a completion for unsupported/invalid opcode (git-fixes)\n- RDMA/rxe: Limit the number of calls to each tasklet (git-fixes)\n- RDMA/rxe: Remove useless pkt parameters (git-fixes)\n- RDMA/siw: Always consume all skbuf data in sk_data_ready() upcall. (git-fixes)\n- RDMA/siw: Fix QP destroy to wait for all references dropped. (git-fixes)\n- RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event (git-fixes)\n- RDMA/siw: Pass a pointer to virt_to_page() (git-fixes)\n- RDMA/srp: Fix srp_abort() (git-fixes)\n- RDMA/srp: Handle dev_set_name() failure (git-fixes)\n- RDMA/srp: Rework the srp_add_port() error path (git-fixes)\n- RDMA/srp: Set scmnd->result only when scmnd is not NULL (git-fixes)\n- RDMA/srp: Support more than 255 rdma ports (git-fixes)\n- RDMA/srp: Use the attribute group mechanism for sysfs attributes (git-fixes)\n- RDMA/srpt: Duplicate port name members (git-fixes)\n- RDMA/srpt: Fix a use-after-free (git-fixes)\n- RDMA/srpt: Introduce a reference count in struct srpt_device (git-fixes)\n- RDMA/usnic: fix set-but-not-unused variable 'flags' warning (git-fixes)\n- RDMA: remove useless condition in siw_create_cq() (git-fixes)\n- Reduce client smbdirect max receive segment size (bsc#1193629).\n- Refresh nvme in-band authentication patches (bsc#1199086)\n- Refresh patches.suse/iommu-vt-d-Acquiring-lock-in-domain-ID-allocation-helpers Fix spin deadlock in intel_iommu (bsc#1203505)\n- Refresh patches.suse/iwlwifi-module-firmware-ucode-fix.patch (bsc#1202131) Now iwlwifi queries *-72.ucode, but again, this is non-existing version. Correct to the existing *-71.ucode\n- Refresh patches.suse/ppc64-kdump-Limit-kdump-base-to-512MB.patch to upstream version.\n- Remove doubly applied amdgpu patches\n- Replace the in-house patch by the above upstream version, patches.suse/md-raid0-fix-buffer-overflow-at-debug-print.patch.\n- Revert 'ALSA: hda: cs35l41: Allow compilation test on non-ACPI configurations' (bsc#1203699).\n- Revert 'ALSA: usb-audio: Split endpoint setups for hw_params and prepare' (git-fixes).\n- Revert 'SUNRPC: Remove unreachable error condition' (git-fixes).\n- Revert 'arm64: Mitigate MTE issues with str{n}cmp()' (git-fixes)\n- Revert 'clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops' (git-fixes).\n- Revert 'constraints: increase disk space for all architectures' (bsc#1203693). This reverts commit 43a9011f904bc7328d38dc340f5e71aecb6b19ca.\n- Revert 'crypto: qat - reduce size of mapped region' (git-fixes).\n- Revert 'drivers/video/backlight/platform_lcd.c: add support for device tree based probe' (git-fixes).\n- Revert 'drm/amdgpu: use dirty framebuffer helper' (git-fixes).\n- Revert 'drm/i915: Hold reference to intel_context over life of i915_request' (git-fixes).\n- Revert 'drm/udl: Kill pending URBs at suspend and disconnect' (bsc#1195917).\n- Revert 'drm/vc4: hvs: Reset muxes at probe time (git-fixes).' (bsc#1202341) This reverts commit 303122d0f2160411fa1068220bc59849d848550d. The reverted change clears hardware state on the RPi4, which leaves the screen blank. Without it, the display works correctly.\n- Revert 'drm: bridge: analogix/dp: add panel prepare/unprepare in suspend/resume time' (git-fixes).\n- Revert 'firmware: arm_scmi: Add clock management to the SCMI power domain' (git-fixes).\n- Revert 'ice: Hide bus-info in ethtool for PRs in switchdev mode' (git-fixes).\n- Revert 'ipv6: Honor all IPv6 PIO Valid Lifetime values' (bsc#1202989).\n- Revert 'net: phy: meson-gxl: improve link-up behavior' (git-fixes).\n- Revert 'net: usb: ax88179_178a needs FLAG_SEND_ZLP' (git-fixes).\n- Revert 'pNFS: nfs3_set_ds_client should set NFS_CS_NOPING' (git-fixes).\n- Revert 'powerpc/rtas: Implement reentrant rtas call' (bsc#1203664 ltc#199236).\n- Revert 'scripts/mod/modpost.c: permit '.cranges' secton for sh64 architecture.' (git-fixes).\n- Revert 'tty: n_gsm: avoid call of sleeping functions from atomic context' (git-fixes).\n- Revert 'tty: n_gsm: replace kicktimer with delayed_work' (git-fixes).\n- Revert 'usb: add quirks for Lenovo OneLink+ Dock' (git-fixes).\n- Revert 'usb: dwc3: disable USB core PHY management' (git-fixes).\n- Revert 'usb: gadget: udc-xilinx: replace memcpy with memcpy_toio' (git-fixes).\n- Revert 'usb: storage: Add quirk for Samsung Fit flash' (git-fixes).\n- Revert 'workqueue: remove unused cancel_work()' (bsc#1204933).\n- Revert 'x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV' (bsc#1190497).\n- Revert selftest patches that have been reverted in stable-5.15.y\n- SCSI: scsi_probe_lun: retry INQUIRY after timeout (bsc#1189297).\n- SMB3: fix lease break timeout when multiple deferred close handles for the same file (bsc#1193629).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: Fix NFSD's request deferral on RDMA transports (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Fix xdr_encode_bool() (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- SUNRPC: RPC level errors should set task->tk_rpc_status (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- USB: Fix ehci infinite suspend-resume loop issue in zhaoxin (git-fixes).\n- USB: Follow-up to SPDX GPL-2.0+ identifiers addition - remove now useless comments (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: add RESET_RESUME quirk for NVIDIA Jetson devices in RCM (git-fixes).\n- USB: bcma: Make GPIO explicitly optional (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: serial: ch314: use usb_control_msg_recv() (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: console: move mutex_unlock() before usb_serial_put() (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Quectel BG95 0x0203 composition (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add Quectel RM520N (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: serial: option: add u-blox LARA-L6 modem (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- USB: serial: option: remove old LARA-R6 PID (git-fixes).\n- USB: serial: qcserial: add new usb-id for Dell branded EM7455 (git-fixes).\n- XArray: Update the LRU list in xas_split() (git-fixes).\n- add another bug reference to some hyperv changes (bsc#1205617).\n- apparmor: Fix failed mount permission check error message (git-fixes).\n- apparmor: Fix memleak in aa_simple_write_to_buffer() (git-fixes).\n- apparmor: fix aa_label_asxprint return check (git-fixes).\n- apparmor: fix absroot causing audited secids to begin with = (git-fixes).\n- apparmor: fix overlapping attachment computation (git-fixes).\n- apparmor: fix quiet_denied for file rules (git-fixes).\n- apparmor: fix reference count leak in aa_pivotroot() (git-fixes).\n- apparmor: fix setting unconfined mode on a loaded profile (git-fixes).\n- arcnet: fix potential memory leak in com20020_probe() (git-fixes).\n- arm64/bti: Disable in kernel BTI when cross section thunks are broken (git-fixes)\n- arm64/mm: Consolidate TCR_EL1 fields (git-fixes).\n- arm64/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).\n- arm64: Add AMPERE1 to the Spectre-BHB affected list (git-fixes).\n- arm64: Do not forget syscall when starting a new thread (git-fixes).\n- arm64: Fix bit-shifting UB in the MIDR_CPU_MODEL() macro (git-fixes)\n- arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes).\n- arm64: dts: allwinner: a64: orangepi-win: Fix LED node name (git-fixes).\n- arm64: dts: imx8: correct clock order (git-fixes).\n- arm64: dts: imx8mm: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mn: Fix NAND controller size-cells (git-fixes).\n- arm64: dts: imx8mp: Add snps,gfladj-refclk-lpm-sel quirk to USB nodes (git-fixes).\n- arm64: dts: imx8mq-librem5: Add bq25895 as max17055's power supply (git-fixes).\n- arm64: dts: juno: Add thermal critical trip points (git-fixes).\n- arm64: dts: ls1088a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: ls208xa: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: lx2160a: specify clock frequencies for the MDIO controllers (git-fixes).\n- arm64: dts: mt7622: fix BPI-R64 WPS button (git-fixes).\n- arm64: dts: mt8192: Fix idle-states entry-method (git-fixes).\n- arm64: dts: mt8192: Fix idle-states nodes naming scheme (git-fixes).\n- arm64: dts: qcom: ipq8074: fix NAND node name (git-fixes).\n- arm64: dts: qcom: msm8916: Fix typo in pronto remoteproc node (git-fixes).\n- arm64: dts: qcom: qcs404: Fix incorrect USB2 PHYs assignment (git-fixes).\n- arm64: dts: qcom: sa8155p-adp: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sc7280: Cleanup the lpasscc node (git-fixes).\n- arm64: dts: qcom: sm8150-xperia-kumano: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250-xperia-edo: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8250: add missing PCIe PHY clock-cells (git-fixes).\n- arm64: dts: qcom: sm8350-hdk: Specify which LDO modes are allowed (git-fixes).\n- arm64: dts: qcom: sm8350: fix UFS PHY serdes size (git-fixes).\n- arm64: dts: renesas: Fix thermal-sensors on single-zone sensors (git-fixes).\n- arm64: dts: renesas: beacon: Fix regulator node names (git-fixes).\n- arm64: dts: rockchip: Fix typo in lisense text for PX30.Core (git-fixes).\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes).\n- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes).\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes).\n- arm64: dts: rockchip: add enable-strobe-pulldown to emmc phy on nanopi4 (git-fixes).\n- arm64: dts: rockchip: lower rk3399-puma-haikou SD controller clock frequency (git-fixes).\n- arm64: dts: ti: k3-j7200: fix main pinmux range (git-fixes).\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes).\n- arm64: efi: Fix handling of misaligned runtime regions and drop warning (git-fixes).\n- arm64: entry: avoid kprobe recursion (git-fixes).\n- arm64: errata: Add Cortex-A510 to the repeat tlbi list (git-fixes) Enable this errata fix configuration option to arm64/default.\n- arm64: errata: Add Cortex-A55 to the repeat tlbi list (git-fixes). Enable CONFIG_ARM64_ERRATUM_2441007, too\n- arm64: errata: Remove AES hwcap for COMPAT tasks (git-fixes) Enable CONFIG_ARM64_ERRATUM_1742098 in arm64/default\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes).\n- arm64: fix rodata=full (git-fixes).\n- arm64: fix rodata=full again (git-fixes)\n- arm64: ftrace: fix module PLTs with mcount (git-fixes).\n- arm64: kasan: Revert 'arm64: mte: reset the page tag in page->flags' (git-fixes).\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: lib: Import latest version of Arm Optimized Routines' strcmp (git-fixes)\n- arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored (git-fixes).\n- arm64: select TRACE_IRQFLAGS_NMI_SUPPORT (git-fixes)\n- arm64: set UXN on swapper page tables (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes).\n- arm64: tegra: Fixup SYSRAM references (git-fixes).\n- arm64: tegra: Mark BPMP channels as no-memory-wc (git-fixes).\n- arm64: tegra: Update Tegra234 BPMP channel addresses (git-fixes).\n- arm64: topology: fix possible overflow in amu_fie_setup() (git-fixes).\n- arm64: topology: move store_cpu_topology() to shared code (git-fixes).\n- arm_pmu: Validate single/group leader events (git-fixes).\n- asm-generic: remove a broken and needless ifdef conditional (git-fixes).\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ata: ahci-imx: Fix MODULE_ALIAS (git-fixes).\n- ata: fix ata_id_has_devslp() (git-fixes).\n- ata: fix ata_id_has_dipm() (git-fixes).\n- ata: fix ata_id_has_ncq_autosense() (git-fixes).\n- ata: fix ata_id_sense_reporting_enabled() and ata_id_has_sense_reporting() (git-fixes).\n- ata: libahci_platform: Sanity check the DT child nodes number (git-fixes).\n- ata: libata-core: do not issue non-internal commands once EH is pending (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ata: libata-scsi: fix SYNCHRONIZE CACHE (16) command failure (git-fixes).\n- ata: libata-scsi: simplify __ata_scsi_queuecmd() (git-fixes).\n- ata: libata-transport: fix double ata_host_put() in ata_tport_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tdev_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tlink_add() (git-fixes).\n- ata: libata-transport: fix error handling in ata_tport_add() (git-fixes).\n- ata: pata_legacy: fix pdc20230_set_piomode() (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath11k: Fix incorrect debug_mask mappings (git-fixes).\n- ath11k: fix netdev open race (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).\n- audit: fix undefined behavior in bit shift for AUDIT_BIT (git-fixes).\n- ax25: Fix ax25 session cleanup problems (git-fixes).\n- batman-adv: Fix hang up with small MTU hard-interface (git-fixes).\n- bitfield.h: Fix 'type of reg too small for mask' test (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (git-fixes).\n- blk-mq: Properly init requests from blk_mq_alloc_request_hctx() (git-fixes).\n- blk-mq: do not create hctx debugfs dir until q->debugfs_dir is created (git-fixes).\n- blk-mq: fix io hung due to missing commit_rqs (git-fixes).\n- blk-wbt: call rq_qos_add() after wb_normal is initialized (git-fixes).\n- blktrace: Trace remapped requests correctly (git-fixes).\n- block/rnbd-srv: Set keep_id to true after mutex_trylock (git-fixes).\n- block: Do not reread partition table on exclusively open device (bsc#1190969).\n- block: Fix fsync always failed if once failed (bsc#1202779).\n- block: Fix wrong offset in bio_truncate() (bsc#1202780).\n- block: add bio_start_io_acct_time() to control start_time (git-fixes).\n- block: blk_queue_enter() / __bio_queue_enter() must return -EAGAIN for nowait (git-fixes).\n- block: drop unused includes in <linux/genhd.h> (git-fixes).\n- block: fix rq-qos breakage from skipping rq_qos_done_bio() (bsc#1202781).\n- block: only mark bio as tracked if it really is tracked (bsc#1202782).\n- bnx2x: Invalidate fastpath HSI version for VFs (git-fixes).\n- bnx2x: Utilize firmware 7.13.21.0 (git-fixes).\n- bnx2x: fix built-in kernel driver load failure (git-fixes).\n- bnx2x: fix driver load from initrd (git-fixes).\n- bnxt_en: Fix bnxt_refclk_read() (git-fixes).\n- bnxt_en: Fix bnxt_reinit_after_abort() code path (git-fixes).\n- bnxt_en: fix livepatch query (git-fixes).\n- bnxt_en: reclaim max resources if sriov enable fails (git-fixes).\n- bonding: 802.3ad: fix no transmission of LACPDUs (git-fixes).\n- bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers (git-fixes).\n- bridge: switchdev: Fix memory leaks when changing VLAN protocol (git-fixes).\n- btrfs-fix-deadlock-between-quota-enable-and-other-qu.patch: (bsc#1205521).\n- btrfs: check if root is readonly while setting security xattr (bsc#1206147).\n- btrfs: do not allow compression on nodatacow files (bsc#1206149).\n- btrfs: export a helper for compression hard check (bsc#1206149).\n- btrfs: fix processing of delayed data refs during backref walking (bsc#1206056).\n- btrfs: fix processing of delayed tree block refs during backref walking (bsc#1206057).\n- btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() (bsc#1203360).\n- btrfs: fix space cache corruption and potential double allocations (bsc#1203361).\n- btrfs: prevent subvol with swapfile from being deleted (bsc#1206035).\n- btrfs: properly flag filesystem with BTRFS_FEATURE_INCOMPAT_BIG_METADATA (git-fixes).\n- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1206036).\n- btrfs: send: fix failures when processing inodes with no links (bsc#1206036).\n- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1206036).\n- btrfs: send: fix sending link commands for existing file paths (bsc#1206036).\n- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1206036).\n- btrfs: send: refactor arguments of get_inode_info() (bsc#1206036).\n- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1206036).\n- btrfs: send: remove unused type parameter to iterate_inode_ref_t (bsc#1206036).\n- btrfs: send: use boolean types for current inode status (bsc#1206036).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- bus: sunxi-rsb: Remove the shutdown callback (git-fixes).\n- bus: sunxi-rsb: Support atomic transfers (git-fixes).\n- ca8210: Fix crash by zero initializing data (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: af_can: fix NULL pointer dereference in can_rx_register() (git-fixes).\n- can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).\n- can: cc770: cc770_isa_probe(): add missing free_cc770dev() (git-fixes).\n- can: do not increase rx statistics when generating a CAN rx error message frame (git-fixes).\n- can: do not increase rx_bytes statistics for RTR frames (git-fixes).\n- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: etas_es58x: es58x_init_netdev(): free netdev when register_candev() (git-fixes).\n- can: gs_usb: gs_can_open(): fix race dev->can.state condition (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: j1939: j1939_send_one(): fix missing CAN header initialization (git-fixes).\n- can: j1939: j1939_sk_queue_activate_next_locked(): replace WARN_ON_ONCE with netdev_warn_once() (git-fixes).\n- can: j1939: transport: j1939_session_skb_drop_old(): spin_unlock_irqrestore() before kfree_skb() (git-fixes).\n- can: kvaser_usb: Fix possible completions during init_completion (git-fixes).\n- can: kvaser_usb: Fix use of uninitialized completion (git-fixes).\n- can: kvaser_usb: kvaser_usb_leaf: fix CAN clock frequency regression (git-fixes).\n- can: kvaser_usb: make use of units.h in assignment of frequency (git-fixes).\n- can: kvaser_usb: replace run-time checks with struct kvaser_usb_driver_info (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).\n- can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: m_can: Add check for devm_clk_get (git-fixes).\n- can: m_can: fix typo prescalar -> prescaler (git-fixes).\n- can: m_can: is_lec_err(): clean up LEC error handling (git-fixes).\n- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (git-fixes).\n- can: mcp251x: Fix race condition on receive interrupt (git-fixes).\n- can: mcp251x: mcp251x_can_probe(): add missing unregister_candev() in error path (git-fixes).\n- can: mcp251xfd: mcp251xfd_dump(): fix comment (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix endianness conversion (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): use correct length to read dev_id (git-fixes).\n- can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in error path (git-fixes).\n- can: netlink: allow configuring of fixed bit rates without need for do_set_bittiming callback (git-fixes).\n- can: netlink: allow configuring of fixed data bit rates without need for do_set_data_bittiming callback (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: rx-offload: can_rx_offload_init_queue(): fix typo (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000_isa: sja1000_isa_probe(): add missing free_sja1000dev() (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- capabilities: fix potential memleak on error path from vfs_getxattr_alloc() (git-fixes).\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK (git-fixes).\n- ceph: allow ceph.dir.rctime xattr to be updatable (bsc#1206050).\n- ceph: avoid putting the realm twice when decoding snaps fails (bsc#1206051).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202823).\n- ceph: do not truncate file in atomic_open (bsc#1202824).\n- ceph: do not update snapshot context when there is no new snapshot (bsc#1206047).\n- ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1206048).\n- ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1206049).\n- ceph: properly handle statfs on multifs setups (bsc#1206045).\n- ceph: switch netfs read ops to use rreq->inode instead of rreq->mapping->host (bsc#1206046).\n- ceph: use correct index when encoding client supported features (bsc#1202822).\n- cfg80211/mac80211: assume CHECKSUM_COMPLETE includes SNAP (bsc#1202131).\n- cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).\n- cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all() (bsc#1196869).\n- cgroup: Fix race condition at rebind_subsystems() (bsc#1203902).\n- cgroup: Fix threadgroup_rwsem <-> cpus_read_lock() deadlock (bsc#1196869).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- char: tpm: Protect tpm_pm_suspend with locks (git-fixes).\n- cifs: Add constructor/destructors for tcon->cfid (bsc#1193629).\n- cifs: Add helper function to check smb1+ server (bsc#1193629).\n- cifs: Do not access tcon->cfids->cfid directly from is_path_accessible (bsc#1193629).\n- cifs: Do not use tcon->cfid directly, use the cfid we get from open_cached_dir (bsc#1193629).\n- cifs: Fix connections leak when tlink setup failed (git-fixes).\n- cifs: Fix memory leak on the deferred close (bsc#1193629).\n- cifs: Fix memory leak when build ntlmssp negotiate blob failed (bsc#1193629).\n- cifs: Fix pages array leak when writedata alloc failed in cifs_writedata_alloc() (bsc#1193629).\n- cifs: Fix pages leak when writedata alloc failed in cifs_write_from_iter() (bsc#1193629).\n- cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message (bsc#1193629).\n- cifs: Fix wrong return value checking when GETFLAGS (git-fixes).\n- cifs: Fix xid leak in cifs_copy_file_range() (bsc#1193629).\n- cifs: Fix xid leak in cifs_create() (bsc#1193629).\n- cifs: Fix xid leak in cifs_flock() (bsc#1193629).\n- cifs: Fix xid leak in cifs_get_file_info_unix() (bsc#1193629).\n- cifs: Fix xid leak in cifs_ses_add_channel() (bsc#1193629).\n- cifs: Make tcon contain a wrapper structure cached_fids instead of cached_fid (bsc#1193629).\n- cifs: Move cached-dir functions into a separate file (bsc#1193629).\n- cifs: Replace a couple of one-element arrays with flexible-array members (bsc#1193629).\n- cifs: Use after free in debug code (git-fixes).\n- cifs: Use help macro to get the header preamble size (bsc#1193629).\n- cifs: Use help macro to get the mid header size (bsc#1193629).\n- cifs: add check for returning value of SMB2_close_init (git-fixes).\n- cifs: add check for returning value of SMB2_set_info_init (git-fixes).\n- cifs: add missing spinlock around tcon refcount (bsc#1193629).\n- cifs: alloc_mid function should be marked as static (bsc#1193629).\n- cifs: always initialize struct msghdr smb_msg completely (bsc#1193629).\n- cifs: always iterate smb sessions using primary channel (bsc#1193629).\n- cifs: avoid deadlocks while updating iface (bsc#1193629).\n- cifs: avoid unnecessary iteration of tcp sessions (bsc#1193629).\n- cifs: avoid use of global locks for high contention data (bsc#1193629).\n- cifs: cache the dirents for entries in a cached directory (bsc#1193629).\n- cifs: change iface_list from array to sorted linked list (bsc#1193629).\n- cifs: destage dirty pages before re-reading them for cache=none (bsc#1193629).\n- cifs: do not send down the destination address to sendmsg for a SOCK_STREAM (bsc#1193629).\n- cifs: drop the lease for cached directories on rmdir or rename (bsc#1193629).\n- cifs: during reconnect, update interface if necessary (bsc#1193629).\n- cifs: enable caching of directories for which a lease is held (bsc#1193629).\n- cifs: find and use the dentry for cached non-root directories also (bsc#1193629).\n- cifs: fix double-fault crash during ntlmssp (bsc#1193629).\n- cifs: fix lock length calculation (bsc#1193629).\n- cifs: fix memory leaks in session setup (bsc#1193629).\n- cifs: fix missing unlock in cifs_file_copychunk_range() (git-fixes).\n- cifs: fix race condition with delayed threads (bsc#1193629).\n- cifs: fix reconnect on smb3 mount types (bsc#1201427).\n- cifs: fix skipping to incorrect offset in emit_cached_dirents (bsc#1193629).\n- cifs: fix small mempool leak in SMB2_negotiate() (bsc#1193629).\n- cifs: fix static checker warning (bsc#1193629).\n- cifs: fix uninitialised var in smb2_compound_op() (bsc#1193629).\n- cifs: fix use-after-free caused by invalid pointer `hostname` (bsc#1193629).\n- cifs: fix use-after-free on the link name (bsc#1193629).\n- cifs: fix wrong unlock before return from cifs_tree_connect() (bsc#1193629).\n- cifs: improve handlecaching (bsc#1193629).\n- cifs: improve symlink handling for smb2+ (bsc#1193629).\n- cifs: lease key is uninitialized in smb1 paths (bsc#1193629).\n- cifs: lease key is uninitialized in two additional functions when smb1 (bsc#1193629).\n- cifs: list_for_each() -> list_for_each_entry() (bsc#1193629).\n- cifs: misc: fix spelling typo in comment (bsc#1193629).\n- cifs: move from strlcpy with unused retval to strscpy (bsc#1193629).\n- cifs: periodically query network interfaces from server (bsc#1193629).\n- cifs: populate empty hostnames for extra channels (bsc#1193629).\n- cifs: prevent copying past input buffer boundaries (bsc#1193629).\n- cifs: remove 'cifs_' prefix from init/destroy mids functions (bsc#1193629).\n- cifs: remove initialization value (bsc#1193629).\n- cifs: remove minor build warning (bsc#1193629).\n- cifs: remove redundant initialization to variable mnt_sign_enabled (bsc#1193629).\n- cifs: remove remaining build warnings (bsc#1193629).\n- cifs: remove some camelCase and also some static build warnings (bsc#1193629).\n- cifs: remove unnecessary (void*) conversions (bsc#1193629).\n- cifs: remove unnecessary locking of chan_lock while freeing session (bsc#1193629).\n- cifs: remove unnecessary type castings (bsc#1193629).\n- cifs: remove unused server parameter from calc_smb_size() (bsc#1193629).\n- cifs: remove useless DeleteMidQEntry() (bsc#1193629).\n- cifs: remove useless parameter 'is_fsctl' from SMB2_ioctl() (bsc#1193629).\n- cifs: replace kfree() with kfree_sensitive() for sensitive data (bsc#1193629).\n- cifs: return correct error in ->calc_signature() (bsc#1193629).\n- cifs: return errors during session setup during reconnects (bsc#1193629).\n- cifs: revalidate mapping when doing direct writes (bsc#1193629).\n- cifs: secmech: use shash_desc directly, remove sdesc (bsc#1193629).\n- cifs: set rc to -ENOENT if we can not get a dentry for the cached dir (bsc#1193629).\n- cifs: skip extra NULL byte in filenames (bsc#1193629).\n- cifs: store a pointer to a fid in the cfid structure instead of the struct (bsc#1193629).\n- cifs: truncate the inode and mapping when we simulate fcollapse (bsc#1193629).\n- cifs: update cifs_ses::ip_addr after failover (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: use ALIGN() and round_up() macros (bsc#1193629).\n- cifs: use LIST_HEAD() and list_move() to simplify code (bsc#1193629).\n- cifs: when a channel is not found for server, log its connection id (bsc#1193629).\n- cifs: when insecure legacy is disabled shrink amount of SMB1 code (bsc#1193629).\n- clk: ast2600: BCLK comes from EPLL (git-fixes).\n- clk: at91: fix the build with binutils 2.27 (git-fixes).\n- clk: baikal-t1: Add SATA internal ref clock buffer (git-fixes).\n- clk: baikal-t1: Add shared xGMAC ref/ptp clocks internal parent (git-fixes).\n- clk: baikal-t1: Fix invalid xGMAC PTP clock divider (git-fixes).\n- clk: bcm2835: Make peripheral PLLC critical (git-fixes).\n- clk: bcm2835: Round UART input clock up (bsc#1188238)\n- clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration (git-fixes).\n- clk: bcm: rpi: Add support for VEC clock (bsc#1196632)\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: bcm: rpi: Prevent out-of-bounds access (git-fixes).\n- clk: bcm: rpi: Use correct order for the parameters of devm_kcalloc() (git-fixes).\n- clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks (git-fixes).\n- clk: imx: scu: fix memleak on platform_device_add() fails (git-fixes).\n- clk: ingenic-tcu: Properly enable registers before accessing timers (git-fixes).\n- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).\n- clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent (git-fixes).\n- clk: mediatek: reset: Fix written reset bit offset (git-fixes).\n- clk: meson: Hold reference returned by of_get_parent() (git-fixes).\n- clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).\n- clk: qcom: apss-ipq6018: mark apcs_alias0_core_clk as critical (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: camcc-sm8250: Fix halt on boot by reducing driver's init level (git-fixes).\n- clk: qcom: camcc-sm8250: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-alpha-pll: fix clk_trion_pll_configure description (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: clk-rcg2: Fail Duty-Cycle configuration if MND divider is not enabled (git-fixes).\n- clk: qcom: clk-rcg2: Make sure to not write d=0 to the NMD register (git-fixes).\n- clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing SYSTEM_MM_NOC_BFDCD_CLK_SRC (git-fixes).\n- clk: qcom: gcc-msm8939: Add missing system_mm_noc_bfdcd_clk_src (git-fixes).\n- clk: qcom: gcc-msm8939: Fix bimc_ddr_clk_src rcgr base address (git-fixes).\n- clk: qcom: gcc-msm8939: Fix weird field spacing in ftbl_gcc_camss_cci_clk (git-fixes).\n- clk: qcom: gcc-msm8939: Point MM peripherals to system_mm_noc clock (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: sprd: Hold reference returned by of_get_parent() (git-fixes).\n- clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).\n- clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).\n- clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).\n- clk: ti: Stop using legacy clkctrl names for omap4 and 5 (git-fixes).\n- clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe (git-fixes).\n- clk: vc5: Fix 5P49V6901 outputs disabling when enabling FOD (git-fixes).\n- clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).\n- clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate (git-fixes).\n- clocksource/drivers/hyperv: add data structure for reference TSC MSR (git-fixes).\n- configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes).\n- constraints: increase disk space for all architectures References: bsc#1203693 aarch64 is already suffering. SLE15-SP5 x86_64 stats show that it is very close to the limit.\n- cpufreq: intel_pstate: Handle no_turbo in frequency invariance (jsc#PED-849).\n- cpufreq: intel_pstate: Support Sapphire Rapids OOB mode (jsc#PED-849).\n- cpufreq: qcom: fix memory leak in error path (git-fixes).\n- cpufreq: qcom: fix writes in read-only memory region (git-fixes).\n- cpufreq: zynq: Fix refcount leak in zynq_get_revision (git-fixes).\n- cpuidle: intel_idle: Drop redundant backslash at line end (jsc#PED-1936).\n- crypto: akcipher - default implementation for setting a private key (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes).\n- crypto: cavium - prevent integer overflow loading firmware (git-fixes).\n- crypto: ccp - During shutdown, check SEV data pointer before using (git-fixes).\n- crypto: ccp - Release dma channels before dmaengine unrgister (git-fixes).\n- crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak (git-fixes).\n- crypto: hisilicon - Kunpeng916 crypto driver do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/hpre - do not use GFP_KERNEL to alloc mem during softirq (git-fixes).\n- crypto: hisilicon/sec - do not sleep when in softirq (git-fixes).\n- crypto: hisilicon/sec - fix auth key size error (git-fixes).\n- crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).\n- crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of (git-fixes).\n- crypto: inside-secure - Change swab to swab32 (git-fixes).\n- crypto: inside-secure - Replace generic aes with libaes (git-fixes).\n- crypto: marvell/octeontx - prevent integer overflows (git-fixes).\n- crypto: qat - fix default value of WDT timer (git-fixes).\n- crypto: sahara - do not sleep when in softirq (git-fixes).\n- crypto: sun8i-ss - do not allocate memory when handling hash requests (git-fixes).\n- crypto: sun8i-ss - fix error codes in allocate_flows() (git-fixes).\n- crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs() (git-fixes).\n- cs-dsp and serial-multi-instantiate enablement (bsc#1203699)\n- device property: Check fwnode->secondary when finding properties (git-fixes).\n- device property: Fix documentation for *_match_string() APIs (git-fixes).\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm btree remove: fix use after free in rebalance_children() (git-fixes).\n- dm crypt: make printing of the key constant-time (git-fixes).\n- dm era: commit metadata in postsuspend after worker stops (git-fixes).\n- dm integrity: fix memory corruption when tag_size is less than digest size (git-fixes).\n- dm mirror log: clear log bits up to BITS_PER_LONG boundary (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dm raid: fix accesses beyond end of raid member array (git-fixes).\n- dm stats: add cond_resched when looping over entries (git-fixes).\n- dm thin: fix use-after-free crash in dm_sm_register_threshold_callback (git-fixes).\n- dm: fix double accounting of flush with data (git-fixes).\n- dm: interlock pending dm_io and dm_wait_for_bios_completion (git-fixes).\n- dm: properly fix redundant bio-based IO accounting (git-fixes).\n- dm: remove unnecessary assignment statement in alloc_dev() (git-fixes).\n- dm: return early from dm_pr_call() if DM device is suspended (git-fixes).\n- dm: revert partial fix for redundant bio-based IO accounting (git-fixes).\n- dma-buf: fix racing conflict of dma_heap_add() (git-fixes).\n- dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC (git-fixes).\n- dma-debug: make things less spammy under memory pressure (git-fixes).\n- dmaengine: at_hdmac: Check return code of dma_async_device_register (git-fixes).\n- dmaengine: at_hdmac: Do not allow CPU to reorder channel enable (git-fixes).\n- dmaengine: at_hdmac: Do not call the complete callback on device_terminate_all (git-fixes).\n- dmaengine: at_hdmac: Do not start transactions at tx_submit level (git-fixes).\n- dmaengine: at_hdmac: Fix at_lli struct definition (git-fixes).\n- dmaengine: at_hdmac: Fix completion of unissued descriptor in case of errors (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over descriptor (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency over the active list (git-fixes).\n- dmaengine: at_hdmac: Fix concurrency problems by removing atc_complete_all() (git-fixes).\n- dmaengine: at_hdmac: Fix descriptor handling when issuing it to hardware (git-fixes).\n- dmaengine: at_hdmac: Fix impossible condition (git-fixes).\n- dmaengine: at_hdmac: Fix premature completion of desc in issue_pending (git-fixes).\n- dmaengine: at_hdmac: Free the memset buf without holding the chan lock (git-fixes).\n- dmaengine: at_hdmac: Protect atchan->status with the channel lock (git-fixes).\n- dmaengine: at_hdmac: Start transfer for cyclic channels in issue_pending (git-fixes).\n- dmaengine: dw-axi-dmac: do not print NULL LLI during error (git-fixes).\n- dmaengine: dw-axi-dmac: ignore interrupt if no descriptor (git-fixes).\n- dmaengine: dw-edma: Fix eDMA Rd/Wr-channels and DMA-direction semantics (git-fixes).\n- dmaengine: hisilicon: Add multi-thread support for a DMA channel (git-fixes).\n- dmaengine: hisilicon: Disable channels when unregister hisi_dma (git-fixes).\n- dmaengine: hisilicon: Fix CQ head update (git-fixes).\n- dmaengine: idxd: add helper for per interrupt handle drain (jsc#PED-682).\n- dmaengine: idxd: add knob for enqcmds retries (jsc#PED-755).\n- dmaengine: idxd: change MSIX allocation based on per wq activation (jsc#PED-664).\n- dmaengine: idxd: change bandwidth token to read buffers (jsc#PED-679).\n- dmaengine: idxd: create locked version of idxd_quiesce() call (jsc#PED-682).\n- dmaengine: idxd: deprecate token sysfs attributes for read buffers (jsc#PED-679).\n- dmaengine: idxd: embed irq_entry in idxd_wq struct (jsc#PED-664).\n- dmaengine: idxd: fix descriptor flushing locking (jsc#PED-664).\n- dmaengine: idxd: fix retry value to be constant for duration of function call (git-fixes).\n- dmaengine: idxd: force wq context cleanup on device disable path (git-fixes).\n- dmaengine: idxd: handle interrupt handle revoked event (jsc#PED-682).\n- dmaengine: idxd: handle invalid interrupt handle descriptors (jsc#PED-682).\n- dmaengine: idxd: int handle management refactoring (jsc#PED-682).\n- dmaengine: idxd: match type for retries var in idxd_enqcmds() (git-fixes).\n- dmaengine: idxd: move interrupt handle assignment (jsc#PED-682).\n- dmaengine: idxd: rework descriptor free path on failure (jsc#PED-682).\n- dmaengine: idxd: set defaults for wq configs (jsc#PED-688).\n- dmaengine: idxd: update IAA definitions for user header (jsc#PED-763).\n- dmaengine: imx-dma: Cast of_device_get_match_data() with (uintptr_t) (git-fixes).\n- dmaengine: ioat: stop mod_timer from resurrecting deleted timer in __cleanup() (git-fixes).\n- dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() (git-fixes).\n- dmaengine: mxs: use platform_driver_register (git-fixes).\n- dmaengine: pxa_dma: use platform_get_irq_optional (git-fixes).\n- dmaengine: sf-pdma: Add multithread support for a DMA channel (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dmaengine: stm32-mdma: Remove dead code in stm32_mdma_irq_handler() (git-fixes).\n- dmaengine: ti: k3-udma-glue: fix memory leak when register device fail (git-fixes).\n- dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() (git-fixes).\n- dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow (git-fixes).\n- dmaengine: xilinx_dma: Fix devm_platform_ioremap_resource error handling (git-fixes).\n- dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent API failure (git-fixes).\n- dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property (git-fixes).\n- docs, kprobes: Fix the wrong location of Kprobes (git-fixes).\n- docs/core-api: expand Fedora instructions for GCC plugins (git-fixes).\n- docs/kernel-parameters: Update descriptions for 'mitigations=' param with retbleed (git-fixes).\n- docs: i2c: i2c-sysfs: fix hyperlinks (git-fixes).\n- docs: i2c: i2c-topology: fix incorrect heading (git-fixes).\n- docs: zh_CN: fix a broken reference (git-fixes).\n- dpaa2-eth: fix ethtool statistics (git-fixes).\n- dpaa2-eth: trace the allocated address instead of page struct (git-fixes).\n- dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drivers/iio: Remove all strcpy() uses (git-fixes).\n- drivers: serial: jsm: fix some leaks in probe (git-fixes).\n- drivers: usb: dwc3-qcom: Add sdm660 compatible (git-fixes).\n- drm/amd/amd_shared.h: Add missing doc for PP_GFX_DCS_MASK (git-fixes).\n- drm/amd/amdgpu: fixing read wrong pf2vf data in SRIOV (git-fixes).\n- drm/amd/amdgpu: skip ucode loading if ucode_size == 0 (git-fixes).\n- drm/amd/display: Add HUBP surface flip interrupt handler (git-fixes).\n- drm/amd/display: Add option to defer works of hpd_rx_irq (git-fixes).\n- drm/amd/display: Assume an LTTPR is always present on fixed_vs links (git-fixes).\n- drm/amd/display: Avoid MPC infinite loop (git-fixes).\n- drm/amd/display: Changed pipe split policy to allow for multi-display (bsc#1152472) Backporting notes: \t* remove changes to non-existing 201 and 31 directories\n- drm/amd/display: Check correct bounds for stream encoder instances for DCN303 (git-fixes).\n- drm/amd/display: Correct MPC split policy for DCN301 (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amd/display: Fix HDMI VSIF V3 incorrect issue (git-fixes).\n- drm/amd/display: Fix build breakage with CONFIG_DEBUG_FS=n (git-fixes).\n- drm/amd/display: Fix double cursor on non-video RGB MPO (git-fixes).\n- drm/amd/display: Fix pixel clock programming (git-fixes).\n- drm/amd/display: Fix surface optimization regression on Carrizo (git-fixes).\n- drm/amd/display: Fix vblank refcount in vrr transition (git-fixes).\n- drm/amd/display: For stereo keep 'FLIP_ANY_FRAME' (git-fixes).\n- drm/amd/display: Ignore First MST Sideband Message Return Error (git-fixes).\n- drm/amd/display: Limit user regamma to a valid value (git-fixes).\n- drm/amd/display: Mark dml30's UseMinimumDCFCLK() as noinline for stack usage (git-fixes).\n- drm/amd/display: Optimize bandwidth on following fast update (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31's CalculateFlipSchedule() (git-fixes).\n- drm/amd/display: Reduce number of arguments of dml31's CalculateWatermarksAndDRAMSpeedChangeSupport() (git-fixes).\n- drm/amd/display: Remove interface for periodic interrupt 1 (git-fixes).\n- drm/amd/display: Reset DMCUB before HW init (git-fixes).\n- drm/amd/display: Revert 'drm/amd/display: turn DPMS off on connector unplug' (git-fixes).\n- drm/amd/display: avoid doing vm_init multiple time (git-fixes).\n- drm/amd/display: clear optc underflow before turn off odm clock (git-fixes).\n- drm/amd/display: skip audio setup when audio stream is enabled (git-fixes).\n- drm/amd/display: update gamut remap if plane has changed (git-fixes).\n- drm/amd/pm: add missing ->fini_microcode interface for Sienna Cichlid (git-fixes).\n- drm/amd/pm: disable BACO entry/exit completely on several sienna cichlid cards (git-fixes).\n- drm/amd/pm: smu7_hwmgr: fix potential off-by-one overflow in 'performance_levels' (git-fixes).\n- drm/amdgpu/display: change pipe policy for DCN 2.0 (git-fixes).\n- drm/amdgpu/display: change pipe policy for DCN 2.1 (git-fixes).\n- drm/amdgpu/gfx10: add wraparound gpu counter check for APUs as well (bsc#1152472) Backporting notes: \t* also fix default branch\n- drm/amdgpu/gfx9: switch to golden tsc registers for renoir+ (bsc#1152472) Backporting notes: \t* replace IP_VERSION() with CHIP_ constants\n- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: Increase tlb flush timeout for sriov (git-fixes).\n- drm/amdgpu: Move psp_xgmi_terminate call from amdgpu_xgmi_remove_device to psp_hw_fini (git-fixes).\n- drm/amdgpu: Remove one duplicated ef removal (git-fixes).\n- drm/amdgpu: Separate vf2pf work item init from virt data exchange (git-fixes).\n- drm/amdgpu: add missing pci_disable_device() in amdgpu_pmops_runtime_resume() (git-fixes).\n- drm/amdgpu: disable BACO on special BEIGE_GOBY card (git-fixes).\n- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).\n- drm/amdgpu: fix initial connector audio value (git-fixes).\n- drm/amdgpu: fix sdma doorbell init ordering on APUs (git-fixes).\n- drm/amdgpu: make sure to init common IP before gmc (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: move nbio ih_doorbell_range() into ih code for vega (git-fixes).\n- drm/amdgpu: move nbio sdma_doorbell_range() into sdma code for vega (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/amdgpu: set vm_update_mode=0 as default for Sienna Cichlid in SRIOV case (git-fixes).\n- drm/amdgpu: use dirty framebuffer helper (git-fixes).\n- drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() (git-fixes).\n- drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr() (git-fixes).\n- drm/amdkfd: Migrate in CPU page fault use current mm (git-fixes).\n- drm/amdkfd: avoid recursive lock in migrations back to RAM (git-fixes).\n- drm/amdkfd: handle CPU fault on COW mapping (git-fixes).\n- drm/bridge: Avoid uninitialized variable warning (git-fixes).\n- drm/bridge: display-connector: implement bus fmts callbacks (git-fixes).\n- drm/bridge: lt8912b: add vsync hsync (git-fixes).\n- drm/bridge: lt8912b: fix corrupted image output (git-fixes).\n- drm/bridge: lt8912b: set hdmi or dvi mode (git-fixes).\n- drm/bridge: lt9611uxc: Cancel only driver's work (git-fixes).\n- drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).\n- drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).\n- drm/bridge: tc358767: Fix (e)DP bridge endpoint parsing in dedicated function (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/bridge: tc358767: Move (e)DP bridge endpoint parsing into dedicated function (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/drv: Fix potential memory leak in drm_dev_init() (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/gma500: Fix BUG: sleeping function called from invalid context errors (git-fixes).\n- drm/hyperv: Add ratelimit on error message (git-fixes).\n- drm/hyperv: Do not overwrite dirt_needed value set by host (git-fixes).\n- drm/i915/display: avoid warnings when registering dual panel backlight (git-fixes).\n- drm/i915/dmabuf: fix sg_table handling in map_dma_buf (git-fixes).\n- drm/i915/dp: Reset frl trained flag before restarting FRL training (git-fixes).\n- drm/i915/ehl: Update MOCS table for EHL (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/gt: Restrict forced preemption to the active context (git-fixes).\n- drm/i915/gt: Skip TLB invalidations once wedged (git-fixes).\n- drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).\n- drm/i915/hdmi: convert intel_hdmi_to_dev to intel_hdmi_to_i915 (bsc#1152489) Backporting notes: \t* update additional patch on top\n- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).\n- drm/i915/sdvo: Filter out invalid outputs more sensibly (git-fixes).\n- drm/i915/sdvo: Setup DDC fully before output init (git-fixes).\n- drm/i915: Implement WaEdpLinkRateDataReload (git-fixes).\n- drm/i915: Reject unsupported TMDS rates on ICL+ (git-fixes).\n- drm/i915: Skip wm/ddb readout for disabled pipes (git-fixes).\n- drm/i915: fix null pointer dereference (git-fixes).\n- drm/imx: imx-tve: Fix return type of imx_tve_connector_mode_valid (git-fixes).\n- drm/komeda: Fix handling of atomic commits in the atomic_commit_tail hook (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: Allow commands to be sent during video mode (git-fixes).\n- drm/mediatek: Keep dsi as LP00 before dcs cmds transfer (git-fixes).\n- drm/mediatek: Modify dsi funcs to atomic operations (git-fixes).\n- drm/mediatek: Separate poweron/poweroff from enable/disable and define new funcs (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/mediatek: dsi: Add atomic {destroy,duplicate}_state, reset callbacks (git-fixes).\n- drm/mediatek: dsi: Move mtk_dsi_stop() call back to mtk_dsi_poweroff() (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/meson: explicitly remove aggregate driver at module unload time (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/mipi-dsi: Detach devices when removing the host (git-fixes).\n- drm/msm/dp: Silence inconsistent indent warning (git-fixes).\n- drm/msm/dp: correct 1.62G link rate at dp_catalog_ctrl_config_msa() (git-fixes).\n- drm/msm/dp: delete DP_RECOVERED_CLOCK_OUT_EN to fix tps4 (git-fixes).\n- drm/msm/dp: fix IRQ lifetime (git-fixes).\n- drm/msm/dpu: Fix comment typo (git-fixes).\n- drm/msm/dpu: Fix for non-visible planes (git-fixes).\n- drm/msm/dpu: index dpu_kms->hw_vbif using vbif_idx (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/hdmi: drop empty 'none' regulator lists (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/hdmi: fix IRQ lifetime (git-fixes).\n- drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/msm: Avoid dirtyfb stalls on video mode displays (v2) (git-fixes).\n- drm/msm: Fix dirtyfb refcounting (git-fixes).\n- drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).\n- drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).\n- drm/msm: fix use-after-free on probe deferral (git-fixes).\n- drm/nouveau/acpi: Do not print error when we get -EINPROGRESS from pm_runtime (git-fixes).\n- drm/nouveau/kms/nv140-: Disable interlacing (git-fixes).\n- drm/nouveau/kms: Fix failure path for creating DP connectors (git-fixes).\n- drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc() (git-fixes).\n- drm/nouveau: Do not pm_runtime_put_sync(), only pm_runtime_put_autosuspend() (git-fixes).\n- drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/nouveau: recognise GA103 (git-fixes).\n- drm/nouveau: wait for the exclusive fence after the shared ones v2 (bsc#1152472) Backporting notes: \t* context changes\n- drm/omap: dss: Fix refcount leak bugs (git-fixes).\n- drm/panel: simple: Fix innolux_g121i1_l01 bus_format (git-fixes).\n- drm/panel: simple: set bpc field for logic technologies displays (git-fixes).\n- drm/panfrost: devfreq: set opp to the recommended one to configure regulator (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).\n- drm/rockchip: dsi: Force synchronous probe (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/scheduler: quieten kernel-doc warnings (git-fixes).\n- drm/shmem-helper: Add missing vunmap on error (git-fixes).\n- drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/tegra: vic: Fix build warning when CONFIG_PM=n (git-fixes).\n- drm/ttm: Fix dummy res NULL ptr deref bug (git-fixes).\n- drm/udl: Add parameter to set number of URBs (bsc#1195917).\n- drm/udl: Add reset_resume (bsc#1195917)\n- drm/udl: Do not re-initialize stuff at retrying the URB list allocation (bsc#1195917).\n- drm/udl: Drop unneeded alignment (bsc#1195917).\n- drm/udl: Enable damage clipping (bsc#1195917).\n- drm/udl: Fix inconsistent urbs.count value during udl_free_urb_list() (bsc#1195917).\n- drm/udl: Fix potential URB leaks (bsc#1195917).\n- drm/udl: Increase the default URB list size to 20 (bsc#1195917).\n- drm/udl: Kill pending URBs at suspend and disconnect (bsc#1195917).\n- drm/udl: Replace BUG_ON() with WARN_ON() (bsc#1195917).\n- drm/udl: Replace semaphore with a simple wait queue (bsc#1195917).\n- drm/udl: Restore display mode on resume (bsc#1195917)\n- drm/udl: Suppress error print for -EPROTO at URB completion (bsc#1195917).\n- drm/udl: Sync pending URBs at suspend / disconnect (bsc#1195917).\n- drm/udl: Sync pending URBs at the end of suspend (bsc#1195917).\n- drm/vc4: Fix missing platform_unregister_drivers() call in vc4_drm_register() (git-fixes).\n- drm/vc4: change vc4_dma_range_matches from a global to static (git-fixes).\n- drm/vc4: drv: Adopt the dma configuration from the HVS or V3D component (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: dsi: Fix dsi0 interrupt support (git-fixes).\n- drm/vc4: dsi: Register dsi0 as the correct vc4 encoder type (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Disable audio if dmas property is present but empty (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Reset HDMI MISC_CONTROL register (git-fixes).\n- drm/vc4: kms: Fix IS_ERR() vs NULL check for vc4_kms (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- drm/virtio: Check whether transferred 2D BO is shmem (git-fixes).\n- drm/virtio: Unlock reservations on virtio_gpu_object_shmem_init() error (git-fixes).\n- drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() (git-fixes).\n- drm: Prevent drm_copy_field() to attempt copying a NULL pointer (git-fixes).\n- drm: Use size_t type for len variable in drm_copy_field() (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: adv7511: fix CEC power down control register offset (git-fixes).\n- drm: bridge: dw_hdmi: only trigger hotplug event on link change (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- drm: fix drm_mipi_dbi build errors (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).\n- drm:pl111: Add of_node_put() when breaking out of for_each_available_child_of_node() (git-fixes).\n- dsa: mv88e6xxx: fix debug print for SPEED_UNFORCED (git-fixes).\n- dt-bindings: PCI: microchip,pcie-host: fix missing clocks properties (git-fixes).\n- dt-bindings: PCI: microchip,pcie-host: fix missing dma-ranges (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8916 MTP compatibles (git-fixes).\n- dt-bindings: arm: qcom: fix MSM8994 boards compatibles (git-fixes).\n- dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding (git-fixes).\n- dt-bindings: clock: qcom,gcc-msm8996: add more GCC clock sources (git-fixes).\n- dt-bindings: clocks: imx8mp: Add ID for usb suspend clock (git-fixes).\n- dt-bindings: crypto: ti,sa2ul: drop dma-coherent property (git-fixes).\n- dt-bindings: display/msm: dpu-sc7180: add missing DPU opp-table (git-fixes).\n- dt-bindings: display/msm: dpu-sdm845: add missing DPU opp-table (git-fixes).\n- dt-bindings: gpio: zynq: Add missing compatible strings (git-fixes).\n- dt-bindings: hwmon: (mr75203) fix 'intel,vm-map' property to be optional (git-fixes).\n- dt-bindings: iio: accel: Add DT binding doc for ADXL355 (git-fixes).\n- dt-bindings: mtd: intel: lgm-nand: Fix compatible string (git-fixes).\n- dt-bindings: mtd: intel: lgm-nand: Fix maximum chip select value (git-fixes).\n- dt-bindings: phy: qcom,qmp-usb3-dp: fix bogus clock-cells property (git-fixes).\n- dt-bindings: phy: qcom,qmp: fix bogus clock-cells property (git-fixes).\n- dt-bindings: power: gpcv2: add power-domains property (git-fixes).\n- dt-bindings: usb: mtk-xhci: Allow wakeup interrupt-names to be optional (git-fixes).\n- dtb: Do not include sources in src.rpm - refer to kernel-source Same as other kernel binary packages there is no need to carry duplicate sources in dtb packages.\n- dyndbg: fix module.dyndbg handling (git-fixes).\n- dyndbg: fix static_branch manipulation (git-fixes).\n- dyndbg: let query-modname override actual module name (git-fixes).\n- e1000e: Fix TX dispatch condition (git-fixes).\n- e100: Fix possible use after free in e100_xmit_prepare (git-fixes).\n- eeprom: idt_89hpesx: uninitialized data in idt_dbgfs_csr_write() (git-fixes).\n- efi/tpm: Pass correct address to memblock_reserve (git-fixes).\n- efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- efi: libstub: Disable struct randomization (git-fixes).\n- efi: libstub: drop pointless get_memory_map() call (git-fixes).\n- efi: random: Use 'ACPI reclaim' memory for random seed (git-fixes).\n- efi: random: reduce seed size to 32 bytes (git-fixes).\n- erofs: fix deadlock when shrink erofs slab (git-fixes).\n- eth: alx: take rtnl_lock on resume (git-fixes).\n- eth: sun: cassini: remove dead code (git-fixes).\n- ethernet: rocker: fix sleep in atomic context bug in neigh_timer_handler (git-fies).\n- exfat: Define NLS_NAME_* as bit flags explicitly (bsc#1201725).\n- exfat: Downgrade ENAMETOOLONG error message to debug messages (bsc#1201725).\n- exfat: Drop superfluous new line for error messages (bsc#1201725).\n- exfat: Expand exfat_err() and co directly to pr_*() macro (bsc#1201725).\n- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1201725).\n- exfat: fix i_blocks for files truncated over 4 GiB (git-fixes).\n- exfat: fix referencing wrong parent directory information after renaming (git-fixes).\n- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I() (git-fixes).\n- exfat: use updated exfat_chain directly during renaming (git-fixes).\n- export: fix string handling of namespace in EXPORT_SYMBOL_NS (git-fixes).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: add new helper interface ext4_try_to_trim_range() (bsc#1202783).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: avoid BUG_ON when creating xattrs (bsc#1205496).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fast commit may miss tracking unwritten range during ftruncate (bsc#1202759).\n- ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state (bsc#1202771).\n- ext4: fix a possible ABBA deadlock due to busy PA (bsc#1202762).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling in ext4_fc_record_modified_inode() (bsc#1202767).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix fallocate to use file_modified to update permissions consistently (bsc#1202769). Refresh ext4-fix-race-condition-between-ext4_write-and-ext4_.patch\n- ext4: fix fast commit may miss tracking range for FALLOC_FL_ZERO_RANGE (bsc#1202757).\n- ext4: fix fs corruption when tring to remove a non-empty directory with IO error (bsc#1202768).\n- ext4: fix incorrect type issue during replay_del_range (bsc#1202867).\n- ext4: fix null-ptr-deref in '__ext4_journal_ensure_credits' (bsc#1202764).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix super block checksum incorrect after mount (bsc#1202773).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: initialize err_blk before calling __ext4_get_inode_loc (bsc#1202763).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: make sure to reset inode lockdep class when quota enabling fails (bsc#1202761).\n- ext4: mark group as trimmed only if it was fully scanned (bsc#1202770).\n- ext4: modify the logic of ext4_mb_new_blocks_simple (bsc#1202766).\n- ext4: prevent used blocks from being allocated during fast commit replay (bsc#1202765).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- ext4: use ext4_ext_remove_space() for fast commit replay delete range (bsc#1202758).\n- fat: add ratelimit to fat*_ent_bread() (git-fixes).\n- fbcon: Add option to enable legacy hardware acceleration (bsc#1152472) Backporting changes: \t* context fixes in other patch \t* update config\n- fbcon: Fix accelerated fbdev scrolling while logo is still shown (bsc#1152472)\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).\n- fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- fbdev: fbcon: Properly revert changes when vc_resize() failed (git-fies).\n- fbdev: smscufx: Fix several use-after-free bugs (git-fixes).\n- fec: Fix timer capture timing in `fec_ptp_enable_pps()` (git-fixes).\n- filemap: Handle sibling entries in filemap_get_read_batch() (bsc#1202774).\n- firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).\n- firmware: arm_scmi: Fix the asynchronous reset requests (git-fixes).\n- firmware: arm_scmi: Harden accesses to the reset domains (git-fixes).\n- firmware: arm_scmi: Harden accesses to the sensor domains (git-fixes).\n- firmware: arm_scmi: Improve checks in the info_get operations (git-fixes).\n- firmware: arm_scmi: Make Rx chan_setup fail on memory errors (git-fixes).\n- firmware: arm_scmi: Suppress the driver's bind attributes (git-fixes).\n- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (git-fixes).\n- firmware: coreboot: Register bus in module init (git-fixes).\n- firmware: cs_dsp: Add lockdep asserts to interface functions (bsc#1203699).\n- firmware: cs_dsp: Add memory chunk helpers (bsc#1203699).\n- firmware: cs_dsp: Add offset to cs_dsp read/write (bsc#1203699).\n- firmware: cs_dsp: Add pre_run callback (bsc#1203699).\n- firmware: cs_dsp: Add pre_stop callback (bsc#1203699).\n- firmware: cs_dsp: Add support for rev 2 coefficient files (bsc#1203699).\n- firmware: cs_dsp: Add version checks on coefficient loading (bsc#1203699).\n- firmware: cs_dsp: Allow creation of event controls (bsc#1203699).\n- firmware: cs_dsp: Clarify some kernel doc comments (bsc#1203699).\n- firmware: cs_dsp: Clear core reset for cache (bsc#1203699).\n- firmware: cs_dsp: Fix overrun of unterminated control name string (bsc#1203699).\n- firmware: cs_dsp: Move lockdep asserts to avoid potential null pointer (bsc#1203699).\n- firmware: cs_dsp: Perform NULL check in cs_dsp_coeff_write/read_ctrl (bsc#1203699).\n- firmware: cs_dsp: Print messages from bin files (bsc#1203699).\n- firmware: cs_dsp: add driver to support firmware loading on Cirrus Logic DSPs (bsc#1203699).\n- firmware: cs_dsp: tidy includes in cs_dsp.c and cs_dsp.h (bsc#1203699).\n- firmware: google: Test spinlock on panic path to avoid lockups (git-fixes).\n- firmware: tegra: Fix error check return value of debugfs_create_file() (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- fix race between exit_itimers() and /proc/pid/timers (git-fixes).\n- fm10k: Fix error handling in fm10k_init_module() (git-fixes).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).\n- fs/binfmt_elf: Fix memory leak in load_elf_binary() (git-fixes).\n- ftrace/x86: Add back ftrace_expected assignment (git-fixes).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- ftrace: Fix char print issue in print_ip_ins() (git-fixes).\n- ftrace: Fix null pointer dereference in ftrace_add_mod() (git-fixes).\n- ftrace: Fix the possible incorrect kernel message (git-fixes).\n- ftrace: Fix use-after-free for dynamic ftrace_ops (git-fixes).\n- ftrace: Optimize the allocation for mcount entries (git-fixes).\n- ftrace: Properly unset FTRACE_HASH_FL_MOD (git-fixes).\n- fuse: Remove the control interface for virtio-fs (bsc#1203798).\n- fuse: add file_modified() to fallocate (bsc#1205332).\n- fuse: fix deadlock between atomic O_TRUNC and page invalidation (bsc#1204533).\n- fuse: fix readdir cache race (bsc#1205331).\n- fuse: ioctl: translate ENOSYS (bsc#1203139).\n- fuse: limit nsec (bsc#1203138).\n- fuse: lock inode unconditionally in fuse_fallocate() (bsc#1206273).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- gcov: support GCC 12.1 and newer compilers (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: amd8111: Fix PCI device reference count leak (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: mockup: fix NULL pointer dereference when removing debugfs (git-fixes).\n- gpio: mockup: remove gpio debugfs when remove device (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: mvebu: Fix check for pwm support on non-A8K platforms (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully (git-fixes).\n- gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init() (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- habanalabs/gaudi: fix shift out of bounds (git-fixes).\n- habanalabs/gaudi: mask constant value before cast (git-fixes).\n- hamradio: fix issue of dev reference count leakage in bpq_device_event() (git-fixes).\n- hid: hid-logitech-hidpp: avoid unnecessary assignments in hidpp_connect_event (git-fixes).\n- hid: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- hinic: Avoid some over memory allocation (git-fixes).\n- hv_netvsc: Fix potential dereference of NULL pointer (git-fixes).\n- hv_netvsc: Fix race between VF offering and VF association message from host (bsc#1204850).\n- hv_netvsc: Print value of invalid ID in netvsc_send_{completion,tx_complete}() (git-fixes).\n- hv_sock: Add validation for untrusted Hyper-V values (git-fixes).\n- hv_sock: Check hv_pkt_iter_first_raw()'s return value (git-fixes).\n- hv_sock: Copy packets sent by Hyper-V out of the ring buffer (git-fixes).\n- hwmon/coretemp: Handle large core ID value (git-fixes).\n- hwmon: (coretemp) Check for null before removing sysfs attrs (git-fixes).\n- hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (git-fixes).\n- hwmon: (dell-smm) Add Dell XPS 13 7390 to fan control whitelist (git-fixes).\n- hwmon: (drivetemp) Add module alias (git-fixes).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- hwmon: (gsc-hwmon) Call of_node_get() before of_find_xxx API (git-fixes).\n- hwmon: (i5500_temp) fix missing pci_disable_device() (git-fixes).\n- hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (git-fixes).\n- hwmon: (ina3221) Fix shunt sum critical calculation (git-fixes).\n- hwmon: (ltc2947) fix temperature scaling (git-fixes).\n- hwmon: (mr75203) enable polling for all VM channels (git-fixes).\n- hwmon: (mr75203) fix VM sensor allocation when 'intel,vm-map' not defined (git-fixes).\n- hwmon: (mr75203) fix multi-channel voltage reading (git-fixes).\n- hwmon: (mr75203) fix voltage equation for negative source input (git-fixes).\n- hwmon: (mr75203) update pvt->v_num and vm_num to the actual number of used sensors (git-fixes).\n- hwmon: (pmbus/mp2888) Fix sensors readouts for MPS Multi-phase mp2888 controller (git-fixes).\n- hwmon: (sht15) Fix wrong assumptions in device remove callback (git-fixes).\n- hwmon: (sht4x) do not overflow clamping operation on 32-bit platforms (git-fixes).\n- hwmon: (tps23861) fix byte order in resistance register (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: acpi: Add an i2c_acpi_client_count() helper function (bsc#1203699).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: designware: Fix handling of real but unexpected device interrupts (git-fixes).\n- i2c: i801: Add support for Intel Ice Lake PCH-N (jsc#PED-634).\n- i2c: i801: Add support for Intel Meteor Lake-P (jsc#PED-732).\n- i2c: i801: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).\n- i2c: i801: Improve handling of chip-specific feature definitions (jsc#PED-634).\n- i2c: i801: add lis3lv02d's I2C address for Vostro 5568 (git-fixes).\n- i2c: imx: If pm_runtime_get_sync() returned 1 device access is possible (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: imx: Only DMA messages with I2C_M_DMA_SAFE flag set (git-fixes).\n- i2c: mlxbf: Fix frequency calculation (git-fixes).\n- i2c: mlxbf: incorrect base address passed during io write (git-fixes).\n- i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() (git-fixes).\n- i2c: mlxbf: support lock mechanism (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- i2c: mxs: Silence a clang warning (git-fixes).\n- i2c: npcm7xx: Fix error handling in npcm_i2c_init() (git-fixes).\n- i2c: npcm: Capitalize the one-line comment (git-fixes).\n- i2c: npcm: Correct slave role behavior (git-fixes).\n- i2c: npcm: Remove own slave addresses 2:10 (git-fixes).\n- i2c: piix4: Fix adapter not be removed in piix4_remove() (git-fixes).\n- i2c: qcom-cci: Fix ordering of pm_runtime_xx and i2c_add_adapter (git-fixes).\n- i2c: tegra: Allocate DMA memory for DMA engine (git-fixes).\n- i2c: xiic: Add platform module alias (git-fixes).\n- i40e: Fix call trace in setup_tx_descriptors (git-fixes).\n- i40e: Fix dropped jumbo frames statistics (git-fixes).\n- i40e: Fix to stop tx_timeout recovery if GLOBR fails (git-fixes).\n- iavf: Fix adminq error handling (git-fixes).\n- iavf: Fix handling of dummy receive descriptors (git-fixes).\n- iavf: Fix reset error handling (git-fixes).\n- ibmvnic: Free rwi on reset success (bsc#1184350 ltc#191533 git-fixes).\n- ice: Allow operation with reduced device MSI-X (bsc#1201987).\n- ice: Do not skip not enabled queues in ice_vc_dis_qs_msg (git-fixes).\n- ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler (git-fixes).\n- ice: Fix race during aux device (un)plugging (git-fixes).\n- ice: Fix switchdev rules book keeping (git-fixes).\n- ice: Match on all profiles in slow-path (git-fixes).\n- ice: arfs: fix use-after-free when freeing @rx_cpu_rmap (git-fixes).\n- ice: check (DD | EOF) bits on Rx descriptor rather than (EOP | RS) (git-fixes).\n- ice: do not setup vlan for loopback VSI (git-fixes).\n- ice: fix 'scheduling while atomic' on aux critical err interrupt (git-fixes).\n- ice: fix crash when writing timestamp on RX rings (git-fixes).\n- ice: fix possible under reporting of ethtool Tx and Rx statistics (git-fixes).\n- ieee80211: add EHT 1K aggregation definitions (bsc#1202131).\n- ieee80211: change HE nominal packet padding value defines (bsc#1202131).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- ieee802154: cc2520: Fix error return code in cc2520_hw_init() (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- igb: Make DMA faster when CPU is active on the PCIe link (git-fixes).\n- igb: fix a use-after-free issue in igb_clean_tx_ring (git-fixes).\n- igb: skip phy status check where unavailable (git-fixes).\n- iio: ABI: Fix wrong format of differential capacitance channel ABI (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: bma400: Fix the scale min and max macro values (git-fixes).\n- iio: accel: bma400: Reordering of header files (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3300: Fix alignment for DMA safety (git-fixes).\n- iio: ad7292: Prevent regulator double disable (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7292: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7923: fix channel readings for some variants (git-fixes).\n- iio: adc: at91-sama5d2_adc: check return status for pressure and touch (git-fixes).\n- iio: adc: at91-sama5d2_adc: disable/prepare buffer on suspend/resume (git-fixes).\n- iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).\n- iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq (git-fixes).\n- iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2496: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1241: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: mcp3911: use correct id bits (git-fixes).\n- iio: adc: mp2629: fix potential array out of bound access (git-fixes).\n- iio: adc: mp2629: fix wrong comparison of channel (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc108s102: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads131e08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: adxl372: Fix unsafe buffer attributes (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: bmc150-accel-core: Fix unsafe buffer attributes (git-fixes).\n- iio: common: ssp: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: core: Fix entry not deleted when iio_register_sw_trigger_type() fails (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5766: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5770r: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: fix iio_format_avail_range() printing for none IIO_VAL_INT (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: health: afe4403: Fix oob read in afe4403_read_raw (git-fixes).\n- iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw (git-fixes).\n- iio: imu: fxos8700: Fix alignment for DMA safety (git-fixes).\n- iio: inkern: fix return value in devm_of_iio_channel_get_by_name() (git-fixes).\n- iio: inkern: only release the device node when done with it (git-fixes).\n- iio: light: apds9960: fix wrong register for gesture gain (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: light: rpr0521: add missing Kconfig dependencies (git-fixes).\n- iio: light: tsl2583: Fix module unloading (git-fixes).\n- iio: ltc2497: Fix reading conversion results (git-fixes).\n- iio: magnetometer: yas530: Change data type of hard_offsets to signed (git-fixes).\n- iio: ms5611: Simplify IO callback parameters (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: pressure: dps310: Refactor startup procedure (git-fixes).\n- iio: pressure: dps310: Reset chip after timeout (git-fixes).\n- iio: pressure: ms5611: changed hardcoded SPI speed to value limited (git-fixes).\n- iio: pressure: ms5611: fixed value compensation bug (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- iio: temp: ltc2983: Fix alignment for DMA safety (git-fixes).\n- iio: temp: maxim_thermocouple: Fix alignment for DMA safety (git-fixes).\n- iio: temperature: ltc2983: allocate iio channels once (git-fixes).\n- iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() (git-fixes).\n- ima: fix blocking of security.ima xattrs of unsupported algorithms (git-fixes).\n- inet_diag: fix kernel-infoleak for UDP sockets (git-fixes).\n- init/Kconfig: fix CC_HAS_ASM_GOTO_TIED_OUTPUT test with dash (git-fixes).\n- intel_idle: Add AlderLake support (jsc#PED-824).\n- intel_idle: Fix SPR C6 optimization (jsc#PED-824 jsc#PED-1936).\n- intel_idle: Fix the 'preferred_cstates' module parameter (jsc#PED-824 jsc#PED-1936).\n- intel_idle: make SPR C1 and C1E be independent (jsc#PED-1936).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- interconnect: imx: fix max_node_id (git-fixes).\n- io-wq: Remove duplicate code in io_workqueue_create() (bnc#1205113).\n- io-wq: do not retry task_work creation failure on fatal conditions (bnc#1205113).\n- io-wq: ensure we exit if thread group is exiting (git-fixes).\n- io-wq: exclusively gate signal based exit on get_signal() return (git-fixes).\n- io-wq: fix cancellation on create-worker failure (bnc#1205113).\n- io-wq: fix silly logic error in io_task_work_match() (bnc#1205113).\n- io_uring: add a schedule point in io_add_buffers() (git-fixes).\n- io_uring: correct __must_hold annotation (git-fixes).\n- io_uring: drop ctx->uring_lock before acquiring sqd->lock (git-fixes).\n- io_uring: ensure IORING_REGISTER_IOWQ_MAX_WORKERS works with SQPOLL (git-fixes).\n- io_uring: fix io_timeout_remove locking (git-fixes).\n- io_uring: fix missing mb() before waitqueue_active (git-fixes).\n- io_uring: fix missing sigmask restore in io_cqring_wait() (git-fixes).\n- io_uring: fix possible poll event lost in multi shot mode (git-fixes).\n- io_uring: pin SQPOLL data before unlocking ring lock (git-fixes).\n- io_uring: terminate manual loop iterator loop correctly for non-vecs (git-fixes).\n- iommu/amd: Clarify AMD IOMMUv2 initialization messages (git-fixes).\n- iommu/amd: Enable swiotlb in all cases (git-fixes).\n- iommu/amd: Fix I/O page table memory leak (git-fixes).\n- iommu/amd: Recover from event log overflow (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu-v3-sva: Fix mm use-after-free (git-fixes).\n- iommu/arm-smmu-v3: Fix size calculation in arm_smmu_mm_invalidate_range() (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/dart: Add missing module owner to ops structure (git-fixes).\n- iommu/dart: check return value after calling platform_get_resource() (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/mediatek: Add mutex for m4u_group and m4u_dom in data (git-fixes).\n- iommu/mediatek: Fix 2 HW sharing pgtable issue (git-fixes).\n- iommu/mediatek: Fix NULL pointer dereference when printing dev_name (git-fixes).\n- iommu/mediatek: Remove clk_disable in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/tegra-smmu: Fix missing put_device() call in tegra_smmu_find (git-fixes).\n- iommu/vt-d: Acquiring lock in domain ID allocation helpers (bsc#1200301).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Do not falsely log intel_iommu is unsupported kernel option (bsc#1204947).\n- iommu/vt-d: Drop stop marker messages (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024 (bsc#1200301).\n- iommu/vt-d: Refactor iommu information of each domain (bsc#1200301).\n- iommu/vt-d: Remove global g_iommus array (bsc#1200301).\n- iommu/vt-d: Remove intel_iommu::domains (bsc#1200301).\n- iommu/vt-d: Remove unnecessary check in intel_iommu_add() (bsc#1200301).\n- iommu/vt-d: Use IDA interface to manage iommu sequence id (bsc#1200301).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu: Fix potential use-after-free during probe (git-fixes).\n- iov_iter: Fix iter_xarray_get_pages{,_alloc}() (git-fixes).\n- iov_iter: fix build issue due to possible type mis-match (git-fixes).\n- ip: Fix data-races around sysctl_ip_fwd_update_priority (git-fixes).\n- ipmi: fix initialization when workqueue allocation fails (git-fixes).\n- ipv4: Fix data-races around sysctl_fib_multipath_hash_policy (git-fixes).\n- ipv6: ping: fix wrong checksum for large frames (bsc#1203183).\n- irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap (git-fixes).\n- irqchip/sifive-plic: Add missing thead,c900-plic match string (git-fixes).\n- irqchip/tegra: Fix overflow implicit truncation warnings (git-fixes).\n- isdn: mISDN: netjet: fix wrong check of device registration (git-fixes).\n- iwlwifi/fw: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: ACPI: support revision 3 WGDS tables (bsc#1202131).\n- iwlwifi: Add support for getting rf id with blank otp (bsc#1202131).\n- iwlwifi: Add support for more BZ HWs (bsc#1202131).\n- iwlwifi: BZ Family BUS_MASTER_DISABLE_REQ code duplication (bsc#1202131).\n- iwlwifi: BZ Family SW reset support (bsc#1202131).\n- iwlwifi: Configure FW debug preset via module param (bsc#1202131).\n- iwlwifi: Fix FW name for gl (bsc#1202131).\n- iwlwifi: Fix missing error code in iwl_pci_probe() (bsc#1202131).\n- iwlwifi: Fix syntax errors in comments (bsc#1202131).\n- iwlwifi: Make use of the helper macro LIST_HEAD() (bsc#1202131).\n- iwlwifi: Read the correct addresses when getting the crf id (bsc#1202131).\n- iwlwifi: Start scratch debug register for Bz family (bsc#1202131).\n- iwlwifi: acpi: fix wgds rev 3 size (bsc#1202131).\n- iwlwifi: acpi: move ppag code from mvm to fw/acpi (bsc#1202131).\n- iwlwifi: add missing entries for Gf4 with So and SoF (bsc#1202131).\n- iwlwifi: add new Qu-Hr device (bsc#1202131).\n- iwlwifi: add new ax1650 killer device (bsc#1202131).\n- iwlwifi: add new device id 7F70 (bsc#1202131).\n- iwlwifi: add new pci SoF with JF (bsc#1202131).\n- iwlwifi: add some missing kernel-doc in struct iwl_fw (bsc#1202131).\n- iwlwifi: add support for BNJ HW (bsc#1202131).\n- iwlwifi: add support for BZ-U and BZ-L HW (bsc#1202131).\n- iwlwifi: add support for Bz-Z HW (bsc#1202131).\n- iwlwifi: add vendor specific capabilities for some RFs (bsc#1202131).\n- iwlwifi: advertise support for HE - DCM BPSK RX/TX (bsc#1202131).\n- iwlwifi: allow rate-limited error messages (bsc#1202131).\n- iwlwifi: api: fix struct iwl_wowlan_status_v7 kernel-doc (bsc#1202131).\n- iwlwifi: api: remove ttl field from TX command (bsc#1202131).\n- iwlwifi: api: remove unused RX status bits (bsc#1202131).\n- iwlwifi: avoid variable shadowing (bsc#1202131).\n- iwlwifi: avoid void pointer arithmetic (bsc#1202131).\n- iwlwifi: bump FW API to 67 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 68 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 69 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 70 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 71 for AX devices (bsc#1202131).\n- iwlwifi: bump FW API to 72 for AX devices (bsc#1202131).\n- iwlwifi: cfg: add support for 1K BA queue (bsc#1202131).\n- iwlwifi: dbg-tlv: clean up iwl_dbg_tlv_update_drams() (bsc#1202131).\n- iwlwifi: dbg: add infra for tracking free buffer size (bsc#1202131).\n- iwlwifi: dbg: check trigger data before access (bsc#1202131).\n- iwlwifi: dbg: disable ini debug in 8000 family and below (bsc#1202131).\n- iwlwifi: dbg: in sync mode do not call schedule (bsc#1202131).\n- iwlwifi: dbg: treat dbgc allocation failure when tlv is missing (bsc#1202131).\n- iwlwifi: dbg: treat non active regions as unsupported regions (bsc#1202131).\n- iwlwifi: dbg_ini: Split memcpy() to avoid multi-field write (bsc#1202131).\n- iwlwifi: de-const properly where needed (bsc#1202131).\n- iwlwifi: debugfs: remove useless double condition (bsc#1202131).\n- iwlwifi: do not dump_stack() when we get an unexpected interrupt (bsc#1202131).\n- iwlwifi: do not use __unused as variable name (bsc#1202131).\n- iwlwifi: drv: load tlv debug data earlier (bsc#1202131).\n- iwlwifi: dump CSR scratch from outer function (bsc#1202131).\n- iwlwifi: dump RCM error tables (bsc#1202131).\n- iwlwifi: dump both TCM error tables if present (bsc#1202131).\n- iwlwifi: dump host monitor data when NIC does not init (bsc#1202131).\n- iwlwifi: dvm: use struct_size over open coded arithmetic (bsc#1202131).\n- iwlwifi: eeprom: clean up macros (bsc#1202131).\n- iwlwifi: fix LED dependencies (bsc#1202131).\n- iwlwifi: fix debug TLV parsing (bsc#1202131).\n- iwlwifi: fix fw/img.c license statement (bsc#1202131).\n- iwlwifi: fix iwl_legacy_rate_to_fw_idx (bsc#1202131).\n- iwlwifi: fix small doc mistake for iwl_fw_ini_addr_val (bsc#1202131).\n- iwlwifi: fix various more -Wcast-qual warnings (bsc#1202131).\n- iwlwifi: fw dump: add infrastructure for dump scrubbing (bsc#1202131).\n- iwlwifi: fw: add support for splitting region type bits (bsc#1202131).\n- iwlwifi: fw: api: add link to PHY context command struct v1 (bsc#1202131).\n- iwlwifi: fw: correctly detect HW-SMEM region subtype (bsc#1202131).\n- iwlwifi: fw: fix some scan kernel-doc (bsc#1202131).\n- iwlwifi: fw: init SAR GEO table only if data is present (bsc#1202131).\n- iwlwifi: fw: make dump_start callback void (bsc#1202131).\n- iwlwifi: fw: remove dead error log code (bsc#1202131).\n- iwlwifi: implement reset flow for Bz devices (bsc#1202131).\n- iwlwifi: iwl-eeprom-parse: mostly dvm only (bsc#1202131).\n- iwlwifi: make iwl_fw_lookup_cmd_ver() take a cmd_id (bsc#1202131).\n- iwlwifi: make iwl_txq_dyn_alloc_dma() return the txq (bsc#1202131).\n- iwlwifi: make some functions friendly to sparse (bsc#1202131).\n- iwlwifi: move symbols into a separate namespace (bsc#1202131).\n- iwlwifi: mvm/api: define system control command (bsc#1202131).\n- iwlwifi: mvm: Add RTS and CTS flags to iwl_tx_cmd_flags (bsc#1202131).\n- iwlwifi: mvm: Add list of OEMs allowed to use TAS (bsc#1202131).\n- iwlwifi: mvm: Add support for a new version of scan request command (bsc#1202131).\n- iwlwifi: mvm: Add support for new rate_n_flags in tx_cmd (bsc#1202131).\n- iwlwifi: mvm: Consider P2P GO operation during scan (bsc#1202131).\n- iwlwifi: mvm: Disable WiFi bands selectively with BIOS (bsc#1202131).\n- iwlwifi: mvm: Do not fail if PPAG isn't supported (bsc#1202131).\n- iwlwifi: mvm: Fix wrong documentation for scan request command (bsc#1202131).\n- iwlwifi: mvm: Passively scan non PSC channels only when requested so (bsc#1202131).\n- iwlwifi: mvm: Read acpi dsm to get channel activation bitmap (bsc#1202131).\n- iwlwifi: mvm: Remove antenna c references (bsc#1202131).\n- iwlwifi: mvm: Support new TX_RSP and COMPRESSED_BA_RES versions (bsc#1202131).\n- iwlwifi: mvm: Support new rate_n_flags for REPLY_RX_MPDU_CMD and RX_NO_DATA_NOTIF (bsc#1202131).\n- iwlwifi: mvm: Support new version of BEACON_TEMPLATE_CMD (bsc#1202131).\n- iwlwifi: mvm: Support new version of ranging response notification (bsc#1202131).\n- iwlwifi: mvm: Support version 3 of tlc_update_notif (bsc#1202131).\n- iwlwifi: mvm: Unify the scan iteration functions (bsc#1202131).\n- iwlwifi: mvm: Use all Rx chains for roaming scan (bsc#1202131).\n- iwlwifi: mvm: add US/CA to TAS block list if OEM isn't allowed (bsc#1202131).\n- iwlwifi: mvm: add a flag to reduce power command (bsc#1202131).\n- iwlwifi: mvm: add additional info for boot info failures (bsc#1202131).\n- iwlwifi: mvm: add dbg_time_point to debugfs (bsc#1202131).\n- iwlwifi: mvm: add definitions for new rate & flags (bsc#1202131).\n- iwlwifi: mvm: add lmac/umac PC info in case of error (bsc#1202131).\n- iwlwifi: mvm: add missing min_size to kernel-doc (bsc#1202131).\n- iwlwifi: mvm: add some missing command strings (bsc#1202131).\n- iwlwifi: mvm: add support for 160Mhz in ranging measurements (bsc#1202131).\n- iwlwifi: mvm: add support for CT-KILL notification version 2 (bsc#1202131).\n- iwlwifi: mvm: add support for IMR based on platform (bsc#1202131).\n- iwlwifi: mvm: add support for OCE scan (bsc#1202131).\n- iwlwifi: mvm: add support for PHY context command v4 (bsc#1202131).\n- iwlwifi: mvm: add support for statistics update version 15 (bsc#1202131).\n- iwlwifi: mvm: allow enabling UHB TAS in the USA via ACPI setting (bsc#1202131).\n- iwlwifi: mvm: always remove the session protection after association (bsc#1202131).\n- iwlwifi: mvm: always store the PPAG table as the latest version (bsc#1202131).\n- iwlwifi: mvm: always use 4K RB size by default (bsc#1202131).\n- iwlwifi: mvm: change old-SN drop threshold (bsc#1202131).\n- iwlwifi: mvm: clean up indenting in iwl_mvm_tlc_update_notif() (bsc#1202131).\n- iwlwifi: mvm: convert old rate & flags to the new format (bsc#1202131).\n- iwlwifi: mvm: correct sta-state logic for TDLS (bsc#1202131).\n- iwlwifi: mvm: correctly set channel flags (bsc#1202131).\n- iwlwifi: mvm: correctly set schedule scan profiles (bsc#1202131).\n- iwlwifi: mvm: d3: move GTK rekeys condition (bsc#1202131).\n- iwlwifi: mvm: d3: support v12 wowlan status (bsc#1202131).\n- iwlwifi: mvm: d3: use internal data representation (bsc#1202131).\n- iwlwifi: mvm: demote non-compliant kernel-doc header (bsc#1202131).\n- iwlwifi: mvm: do not get address of mvm->fwrt just to dereference as a pointer (bsc#1202131).\n- iwlwifi: mvm: do not send BAID removal to the FW during hw_restart (bsc#1202131).\n- iwlwifi: mvm: do not trust hardware queue number (bsc#1202131).\n- iwlwifi: mvm: drop too short packets silently (bsc#1202131).\n- iwlwifi: mvm: extend session protection on association (bsc#1202131).\n- iwlwifi: mvm: fix WGDS table print in iwl_mvm_chub_update_mcc() (bsc#1202131).\n- iwlwifi: mvm: fix a stray tab (bsc#1202131).\n- iwlwifi: mvm: fix condition which checks the version of rate_n_flags (bsc#1202131).\n- iwlwifi: mvm: fix delBA vs. NSSN queue sync race (bsc#1202131).\n- iwlwifi: mvm: fix ieee80211_get_he_iftype_cap() iftype (bsc#1202131).\n- iwlwifi: mvm: fix off by one in iwl_mvm_stat_iterator_all_macs() (bsc#1202131).\n- iwlwifi: mvm: fw: clean up hcmd struct creation (bsc#1202131).\n- iwlwifi: mvm: handle RX checksum on Bz devices (bsc#1202131).\n- iwlwifi: mvm: improve log when processing CSA (bsc#1202131).\n- iwlwifi: mvm: isolate offload assist (checksum) calculation (bsc#1202131).\n- iwlwifi: mvm: make iwl_mvm_reconfig_scd() static (bsc#1202131).\n- iwlwifi: mvm: offload channel switch timing to FW (bsc#1202131).\n- iwlwifi: mvm: only enable HE DCM if we also support TX (bsc#1202131).\n- iwlwifi: mvm: optionally suppress assert log (bsc#1202131).\n- iwlwifi: mvm: parse firmware alive message version 6 (bsc#1202131).\n- iwlwifi: mvm: read 6E enablement flags from DSM and pass to FW (bsc#1202131).\n- iwlwifi: mvm: reduce WARN_ON() in TX status path (bsc#1202131).\n- iwlwifi: mvm: refactor iwl_mvm_sta_rx_agg() (bsc#1202131).\n- iwlwifi: mvm: refactor setting PPE thresholds in STA_HE_CTXT_CMD (bsc#1202131).\n- iwlwifi: mvm: remove card state notification code (bsc#1202131).\n- iwlwifi: mvm: remove cipher scheme support (bsc#1202131).\n- iwlwifi: mvm: remove csi from iwl_mvm_pass_packet_to_mac80211() (bsc#1202131).\n- iwlwifi: mvm: remove iwl_mvm_disable_txq() flags argument (bsc#1202131).\n- iwlwifi: mvm: remove session protection after auth/assoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection on disassoc (bsc#1202131).\n- iwlwifi: mvm: remove session protection upon station removal (bsc#1202131).\n- iwlwifi: mvm: rfi: handle deactivation notification (bsc#1202131).\n- iwlwifi: mvm: rfi: update rfi table (bsc#1202131).\n- iwlwifi: mvm: rfi: use kmemdup() to replace kzalloc + memcpy (bsc#1202131).\n- iwlwifi: mvm: scrub key material in firmware dumps (bsc#1202131).\n- iwlwifi: mvm: set BT-coex high priority for 802.1X/4-way-HS (bsc#1202131).\n- iwlwifi: mvm: set inactivity timeouts also for PS-poll (bsc#1202131).\n- iwlwifi: mvm: starting from 22000 we have 32 Rx AMPDU sessions (bsc#1202131).\n- iwlwifi: mvm: support Bz TX checksum offload (bsc#1202131).\n- iwlwifi: mvm: support RLC configuration command (bsc#1202131).\n- iwlwifi: mvm: support new BAID allocation command (bsc#1202131).\n- iwlwifi: mvm: support revision 1 of WTAS table (bsc#1202131).\n- iwlwifi: mvm: support v3 of station HE context command (bsc#1202131).\n- iwlwifi: mvm: update BAID allocation command again (bsc#1202131).\n- iwlwifi: mvm: update RFI TLV (bsc#1202131).\n- iwlwifi: mvm: update definitions due to new rate & flags (bsc#1202131).\n- iwlwifi: mvm: update rate scale in moving back to assoc state (bsc#1202131).\n- iwlwifi: mvm: use a define for checksum flags mask (bsc#1202131).\n- iwlwifi: mvm: use debug print instead of WARN_ON() (bsc#1202131).\n- iwlwifi: nvm: Correct HE capability (bsc#1202131).\n- iwlwifi: parse debug exclude data from firmware file (bsc#1202131).\n- iwlwifi: parse error tables from debug TLVs (bsc#1202131).\n- iwlwifi: pcie: Adapt rx queue write pointer for Bz family (bsc#1202131).\n- iwlwifi: pcie: add jacket bit to device configuration parsing (bsc#1202131).\n- iwlwifi: pcie: add support for MS devices (bsc#1202131).\n- iwlwifi: pcie: adjust to Bz completion descriptor (bsc#1202131).\n- iwlwifi: pcie: fix SW error MSI-X mapping (bsc#1202131).\n- iwlwifi: pcie: fix constant-conversion warning (bsc#1202131).\n- iwlwifi: pcie: fix killer name matching for AX200 (bsc#1202131).\n- iwlwifi: pcie: iwlwifi: fix device id 7F70 struct (bsc#1202131).\n- iwlwifi: pcie: make sure iwl_rx_packet_payload_len() will not underflow (bsc#1202131).\n- iwlwifi: pcie: refactor dev_info lookup (bsc#1202131).\n- iwlwifi: pcie: remove duplicate entry (bsc#1202131).\n- iwlwifi: pcie: remove two duplicate PNJ device entries (bsc#1202131).\n- iwlwifi: pcie: retake ownership after reset (bsc#1202131).\n- iwlwifi: pcie: simplify iwl_pci_find_dev_info() (bsc#1202131).\n- iwlwifi: pcie: support Bz suspend/resume trigger (bsc#1202131).\n- iwlwifi: pcie: try to grab NIC access early (bsc#1202131).\n- iwlwifi: pcie: update sw error interrupt for BZ family (bsc#1202131).\n- iwlwifi: pnvm: print out the version properly (bsc#1202131).\n- iwlwifi: prefer WIDE_ID() over iwl_cmd_id() (bsc#1202131).\n- iwlwifi: propagate (const) type qualifier (bsc#1202131).\n- iwlwifi: recognize missing PNVM data and then log filename (bsc#1202131).\n- iwlwifi: remove MODULE_AUTHOR() statements (bsc#1202131).\n- iwlwifi: remove command ID argument from queue allocation (bsc#1202131).\n- iwlwifi: remove contact information (bsc#1202131).\n- iwlwifi: remove deprecated broadcast filtering feature (bsc#1202131).\n- iwlwifi: remove redundant iwl_finish_nic_init() argument (bsc#1202131).\n- iwlwifi: remove unused DC2DC_CONFIG_CMD definitions (bsc#1202131).\n- iwlwifi: remove unused iwlax210_2ax_cfg_so_hr_a0 structure (bsc#1202131).\n- iwlwifi: remove unused macros (bsc#1202131).\n- iwlwifi: rename CHANNEL_SWITCH_NOA_NOTIF to CHANNEL_SWITCH_START_NOTIF (bsc#1202131).\n- iwlwifi: rename GEO_TX_POWER_LIMIT to PER_CHAIN_LIMIT_OFFSET_CMD (bsc#1202131).\n- iwlwifi: rs: add support for TLC config command ver 4 (bsc#1202131).\n- iwlwifi: scan: Modify return value of a function (bsc#1202131).\n- iwlwifi: support 4-bits in MAC step value (bsc#1202131).\n- iwlwifi: support SAR GEO Offset Mapping override via BIOS (bsc#1202131).\n- iwlwifi: support new queue allocation command (bsc#1202131).\n- iwlwifi: swap 1650i and 1650s killer struct names (bsc#1202131).\n- iwlwifi: tlc: Add logs in rs_fw_rate_init func to print TLC configuration (bsc#1202131).\n- iwlwifi: use 4k queue size for Bz A-step (bsc#1202131).\n- iwlwifi: yoyo: Avoid using dram data if allocation failed (bsc#1202131).\n- iwlwifi: yoyo: add IMR DRAM dump support (bsc#1202131).\n- iwlwifi: yoyo: disable IMR DRAM region if IMR is disabled (bsc#1202131).\n- iwlwifi: yoyo: dump IMR DRAM only for HW and FW error (bsc#1202131).\n- iwlwifi: yoyo: fix DBGC allocation flow (bsc#1202131).\n- iwlwifi: yoyo: fix DBGI_SRAM ini dump header (bsc#1202131).\n- iwlwifi: yoyo: fix issue with new DBGI_SRAM region read (bsc#1202131).\n- iwlwifi: yoyo: fw debug config from context info and preset (bsc#1202131).\n- iwlwifi: yoyo: send hcmd to fw after dump collection completes (bsc#1202131).\n- iwlwifi: yoyo: support TLV-based firmware reset (bsc#1202131).\n- iwlwifi: yoyo: support dump policy for the dump size (bsc#1202131).\n- iwlwifi: yoyo: support for DBGC4 for dram (bsc#1202131).\n- iwlwifi: yoyo: support for ROM usniffer (bsc#1202131).\n- ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero (git-fixes).\n- ixgbe: fix bcast packets Rx on VF after promisc removal (git-fixes).\n- ixgbe: fix unexpected VLAN Rx in promisc mode on VF (git-fixes).\n- jbd2: export jbd2_journal_[grab|put]_journal_head (bsc#1202775).\n- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- kABI workaround for spi changes (bsc#1203699).\n- kABI: Add back removed struct paca member (bsc#1203664 ltc#199236).\n- kABI: Fix after adding trace_iterator.wait_index (git-fixes).\n- kABI: Fix kABI after 'KVM: x86/pmu: Use different raw event masks for AMD and Intel' (git-fixes).\n- kABI: Fix kABI after SNP-Guest backport (jsc#SLE-19924, jsc#SLE-24814).\n- kABI: Fix kABI after backport Add pmc->intr to refactor kvm_perf_overflow{_intr}() (git-fixes).\n- kABI: Fix kABI after backport Always set kvm_run->if_flag (git-fixes).\n- kABI: Fix kABI after backport Forcibly leave nested virt when SMM state is toggled (git-fixes).\n- kABI: Fix kABI after backport Refactoring find_arch_event() to pmc_perf_hw_id() (git-fixes).\n- kABI: fix adding another field to scsi_device (bsc#1203039).\n- kABI: reintroduce a non-inline usleep_range (git-fixes).\n- kABI: scsi: libiscsi: fix removal of iscsi_create_conn (bsc#1198410).\n- kabi/severities: Exclude ppc kvm\n- kabi/severities: add Qlogic qed symbols\n- kabi/severities: add drivers/scsi/hisi_sas for bsc#1202471\n- kabi/severities: add hisilicon hns3 symbols\n- kabi/severities: add microchip dsa drivers\n- kabi/severities: ignore CS35L41-specific exports (bsc#1203699)\n- kabi/severities: ignore kABI changes in mwifiex drivers Those symbols are used only locally in mwifiex (sub-)modules.\n- kabi/severities: octeontx2 driver (jsc#SLE-24682)\n- kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).\n- kbuild: Unify options for BTF generation for vmlinux and modules (bsc#1204693).\n- kbuild: disable header exports for UML in a straightforward way (git-fixes).\n- kbuild: dummy-tools: avoid tmpdir leak in dummy gcc (git-fixes).\n- kbuild: fix the modules order between drivers and libs (git-fixes).\n- kbuild: link vmlinux only once for CONFIG_TRIM_UNUSED_KSYMS (2nd attempt) (git-fixes).\n- kbuild: remove the target in signal traps when interrupted (git-fixes).\n- kbuild: rpm-pkg: fix breakage when V=1 is used (git-fixes).\n- kcm: fix strp_init() order and cleanup (git-fies).\n- kernel-binary: move @NOSOURCE@ to @SOURCES@ as in other packages\n- kernel-source: include the kernel signature file We assume that the upstream tarball is used for released kernels. Then we can also include the signature file and keyring in the kernel-source src.rpm. Because of mkspec code limitation exclude the signature and keyring from binary packages always - mkspec does not parse spec conditionals.\n- kernfs: fix use-after-free in __kernfs_remove (git-fixes).\n- kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec, KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: turn all kexec_mutex acquisitions into trylocks (git-fixes).\n- kexec_file: drop weak attribute from functions (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kselftest/arm64: Fix validatation termination record after EXTRA_CONTEXT (git-fixes).\n- kselftest/cgroup: fix test_stress.sh to use OUTPUT dir (git-fixes).\n- kselftest/vm: fix tests build with old libc (git-fixes).\n- kselftest: Fix vdso_test_abi return status (git-fixes).\n- kselftest: signal all child processes (git-fixes).\n- kvm: selftests: do not use bitfields larger than 32-bits for PTEs (git-fixes).\n- l3mdev: l3mdev_master_upper_ifindex_by_index_rcu should be using netdev_master_upper_dev_get_rcu (git-fixes).\n- landlock: Add clang-format exceptions (git-fixes).\n- landlock: Change landlock_add_rule(2) argument check ordering (git-fixes).\n- landlock: Change landlock_restrict_self(2) check ordering (git-fixes).\n- landlock: Create find_rule() from unmask_layers() (git-fixes).\n- landlock: Define access_mask_t to enforce a consistent access mask size (git-fixes).\n- landlock: Fix landlock_add_rule(2) documentation (git-fixes).\n- landlock: Fix same-layer rule unions (git-fixes).\n- landlock: Format with clang-format (git-fixes).\n- landlock: Reduce the maximum number of layers to 16 (git-fixes).\n- landlock: Use square brackets around 'landlock-ruleset' (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lib/raid6/test: fix multiple definition linking error (git-fixes).\n- lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall (git-fixes).\n- lib/smp_processor_id: fix imbalanced instrumentation_end() call (git-fixes).\n- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205 (git-fixes).\n- livepatch: Add a missing newline character in klp_module_coming() (bsc#1071995).\n- livepatch: fix race between fork and KLP transition (bsc#1071995).\n- lkdtm: Disable return thunks in rodata.c (bsc#1190497).\n- lockd: detect and reject lock arguments that overflow (git-fixes).\n- lockdep: Correct lock_classes index mapping (git-fixes).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- locking/lockdep: Fix lockdep_init_map_*() confusion (git-fixes).\n- locking/lockdep: Iterate lock_classes directly when reading lockdep files (git-fixes).\n- loop: Check for overflow while configuring loop (git-fies).\n- loop: Use pr_warn_once() for loop_control_remove() warning (git-fixes).\n- loop: use sysfs_emit() in the sysfs xxx show() (git-fixes).\n- mISDN: fix misuse of put_device() in mISDN_register_device() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_dsp_element_register() (git-fixes).\n- mISDN: fix possible memory leak in mISDN_register_device() (git-fixes).\n- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).\n- mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).\n- mac80211: fix a memory leak where sta_info is not freed (git-fixes).\n- mac80211: introduce channel switch disconnect function (bsc#1202131).\n- mac80211: radiotap: Use BIT() instead of shifts (git-fixes).\n- mac802154: Fix LQI recording (git-fixes).\n- mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (git-fixes).\n- macsec: Fix invalid error code set (git-fixes).\n- macsec: add missing attribute validation for offload (git-fixes).\n- macsec: always read MACSEC_SA_ATTR_PN as a u64 (git-fixes).\n- macsec: clear encryption keys from the stack after setting up offload (git-fixes).\n- macsec: delete new rxsc when offload fails (git-fixes).\n- macsec: fix NULL deref in macsec_add_rxsa (git-fixes).\n- macsec: fix detection of RXSCs when toggling offloading (git-fixes).\n- macsec: fix error message in macsec_add_rxsa and _txsa (git-fixes).\n- macsec: fix secy->n_rx_sc accounting (git-fixes).\n- macsec: limit replay window size with XPN (git-fixes).\n- macvlan: enforce a consistent minimal mtu (git-fixes).\n- mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).\n- mailbox: mpfs: account for mbox offsets while sending (git-fixes).\n- mailbox: mpfs: fix handling of the reg property (git-fixes).\n- marvell: octeontx2: build error: unknown type name 'u64' (jsc#SLE-24682).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- md/raid1: fix missing bitmap update w/o WriteMostly devices (bsc#1203036).\n- md/raid5: Ensure stripe_fill happens on non-read IO with journal (git-fixes).\n- md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() (git-fixes).\n- md: Replace snprintf with scnprintf (git-fixes, bsc#1164051).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- media: [PATCH] pci: atomisp_cmd: fix three missing checks on list iterator (git-fixes).\n- media: aspeed: Fix an error handling path in aspeed_video_probe() (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix warning in configs without OF (git-fixes).\n- media: atomisp: prevent integer overflow in sh_css_set_black_frame() (git-fixes).\n- media: cedrus: Fix endless loop in cedrus_h265_skip_bits() (git-fixes).\n- media: cedrus: Set the platform driver data earlier (git-fixes).\n- media: cedrus: h265: Fix flag name (git-fixes).\n- media: cedrus: hevc: Add check for invalid timestamp (git-fixes).\n- media: coda: Add more H264 levels for CODA960 (git-fixes).\n- media: coda: Fix reported H264 profile (git-fixes).\n- media: cros-ec-cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).\n- media: driver/nxp/imx-jpeg: fix a unexpected return value problem (git-fixes).\n- media: dvb-frontends/drxk: initialize err to 0 (git-fixes).\n- media: dvb_vb2: fix possible out of bound access (git-fixes).\n- media: exynos4-is: Change clk_disable to clk_disable_unprepare (git-fixes).\n- media: exynos4-is: Fix PM disable depth imbalance in fimc_is_probe (git-fixes).\n- media: flexcop-usb: fix endpoint type check (git-fixes).\n- media: hantro: postproc: Fix motion vector space size (git-fixes).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: hevc: Embedded indexes in RPS (git-fixes).\n- media: imx-jpeg: Add pm-runtime support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Add pm-sleep support for imx-jpeg (git-fixes).\n- media: imx-jpeg: Correct some definition according specification (git-fixes).\n- media: imx-jpeg: Disable slot interrupt when frame done (git-fixes).\n- media: imx-jpeg: Fix potential array out of bounds in queue_setup (git-fixes).\n- media: imx-jpeg: Leave a blank space before the configuration data (git-fixes).\n- media: imx-jpeg: Refactor function mxc_jpeg_parse (git-fixes).\n- media: imx-jpeg: use NV12M to represent non contiguous NV12 (git-fixes).\n- media: ipu3-imgu: Fix NULL pointer dereference in active selection access (git-fixes).\n- media: mceusb: Use new usb_control_msg_*() routines (git-fixes).\n- media: mceusb: set timeout to at least timeout provided (git-fixes).\n- media: meson: vdec: add missing clk_disable_unprepare on error in vdec_hevc_start() (git-fixes).\n- media: meson: vdec: fix possible refcount leak in vdec_probe() (git-fixes).\n- media: platform: mtk-mdp: Fix mdp_ipi_comm structure alignment.\n- media: pvrusb2: fix memory leak in pvr_probe (git-fixes).\n- media: rkisp1: Do not pass the quantization to rkisp1_csm_config() (git-fixes).\n- media: rkisp1: Initialize color space on resizer sink and source pads (git-fixes).\n- media: rkisp1: Use correct macro for gradient registers (git-fixes).\n- media: rkisp1: Zero v4l2_subdev_format fields in when validating links (git-fixes).\n- media: rkvdec: Disable H.264 error detection (git-fixes).\n- media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (git-fixes).\n- media: st-delta: Fix PM disable depth imbalance in delta_probe (git-fixes).\n- media: tw686x: Fix memory leak in tw686x_video_init (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: uvcvideo: Fix memory leak in uvc_gpio_parse (git-fixes).\n- media: uvcvideo: Use entity get_cur in uvc_ctrl_set (git-fixes).\n- media: v4l2-compat-ioctl32.c: zero buffer passed to v4l2_compat_get_array_args() (git-fixes).\n- media: v4l2-dv-timings: add sanity checks for blanking values (git-fixes).\n- media: v4l2-mem2mem: prevent pollerr when last_buffer_dequeued is set (git-fixes).\n- media: v4l2: Fix v4l2_i2c_subdev_set_name function documentation (git-fixes).\n- media: v4l: subdev: Fail graciously when getting try data for NULL state (git-fixes).\n- media: venus: dec: Handle the case where find_format fails (git-fixes).\n- media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check 'interlaced' (git-fixes).\n- media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes).\n- media: vivid: s_fbuf: add more sanity checks (git-fixes).\n- media: vivid: set num_in/outputs to 0 if not supported (git-fixes).\n- media: vsp1: Fix offset calculation for plane cropping.\n- media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init (git-fixes).\n- mediatek: mt76: eeprom: fix missing of_node_put() in mt76_find_power_limits_node() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).\n- memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings() (git-fixes).\n- memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq() (git-fixes).\n- mfd: fsl-imx25: Fix check for platform_get_irq() errors (git-fixes).\n- mfd: intel-lpss: Add Intel Raptor Lake PCH-S PCI IDs (jsc#PED-634).\n- mfd: intel_soc_pmic: Fix an error handling path in intel_soc_pmic_i2c_probe() (git-fixes).\n- mfd: lp8788: Fix an error handling path in lp8788_irq_init() and lp8788_irq_init() (git-fixes).\n- mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: sm501: Add check for platform_driver_register() (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- minix: fix bug when opening a file with O_DIRECT (git-fixes).\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (git-fixes).\n- misc: cs35l41: Remove unused pdn variable (bsc#1203699).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).\n- misc: pci_endpoint_test: Aggregate params checking for xfer (git-fixes).\n- misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mkspec: eliminate @NOSOURCE@ macro This should be alsways used with @SOURCES@, just include the content there.\n- mlxsw: i2c: Fix initialization error flow (git-fixes).\n- mlxsw: spectrum: Clear PTP configuration after unregistering the netdevice (git-fixes).\n- mlxsw: spectrum_cnt: Reorder counter pools (git-fixes).\n- mlxsw: spectrum_router: Fix IPv4 nexthop gateway indication (git-fixes).\n- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page (bsc#1204575).\n- mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes). kABI: Fix kABI after 'mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse' (git-fixes).\n- mm: Fix PASID use-after-free issue (bsc#1203908).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).\n- mmc: block: Add single read for 4k sector cards (git-fixes).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: core: Fix UHS-I SD 1.8V workaround branch (git-fixes).\n- mmc: core: Fix ambiguous TRIM and DISCARD arg (git-fixes).\n- mmc: core: Fix inconsistent sd3_bus_mode at UHS-I SD voltage switch failure (git-fixes).\n- mmc: core: Fix kernel panic when remove non-standard SDIO card (git-fixes).\n- mmc: core: Replace with already defined values for readability (git-fixes).\n- mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).\n- mmc: core: properly select voltage range without power cycle (git-fixes).\n- mmc: cqhci: Provide helper for resetting both SDHCI and CQHCI (git-fixes).\n- mmc: hsq: Fix data stomping during mmc recovery (git-fixes).\n- mmc: meson-gx: Fix an error handling path in meson_mmc_probe() (git-fixes).\n- mmc: mmc_test: Fix removal of debugfs file (git-fixes).\n- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).\n- mmc: mxcmmc: Silence a clang warning (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: renesas_sdhi: Get the reset handle early in the probe (git-fixes).\n- mmc: sdhci-brcmstb: Enable Clock Gating to save power (git-fixes).\n- mmc: sdhci-brcmstb: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-brcmstb: Re-organize flags (git-fixes).\n- mmc: sdhci-esdhc-imx: Propagate ESDHC_FLAG_HS400* only on 8bit bus (git-fixes).\n- mmc: sdhci-esdhc-imx: correct CQHCI exit halt state check (git-fixes).\n- mmc: sdhci-esdhc-imx: use the correct host caps for MMC_CAP_8_BIT_DATA (git-fixes).\n- mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).\n- mmc: sdhci-of-arasan: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- mmc: sdhci-pci-core: Disable ES for ASUS BIOS on Jasper Lake (git-fixes).\n- mmc: sdhci-pci-o2micro: fix card detect fail issue caused by CD# debounce timeout (git-fixes).\n- mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() (git-fixes).\n- mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).\n- mmc: sdhci-sprd: Fix no reset data and command after voltage switch (git-fixes).\n- mmc: sdhci-tegra: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: sdhci_am654: 'select', not 'depends' REGMAP_MMIO (git-fixes).\n- mmc: sdhci_am654: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- mmc: tmio: avoid glitches when resetting (git-fixes).\n- mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe() (git-fixes).\n- mms: sdhci-esdhc-imx: Fix SDHCI_RESET_ALL for CQHCI (git-fixes).\n- module: change to print useful messages from elf_validity_check() (git-fixes).\n- module: fix [e_shstrndx].sh_size=0 OOB access (git-fixes).\n- msft-hv-2570-hv_netvsc-Add-support-for-XDP_REDIRECT.patch: (bsc#1199364).\n- mt76: mt7615: do not update pm stats in case of error (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt76: mt7921: enlarge maximum VHT MPDU length to 11454 (git-fixes).\n- mt76: mt7921: fix aggregation subframes setting to HE max (git-fixes).\n- mtd: dataflash: Add SPI ID table (git-fixes).\n- mtd: devices: docg3: check the return value of devm_ioremap() in the probe (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: parsers: bcm47xxpart: Fix halfblock reads (git-fixes).\n- mtd: parsers: bcm47xxpart: print correct offset on read error (git-fixes).\n- mtd: parsers: ofpart: Fix refcount leak in bcm4908_partitions_fw_offset (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: arasan: Fix clock rate in NV-DDR (git-fixes).\n- mtd: rawnand: arasan: Update NAND bus clock instead of system clock (git-fixes).\n- mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).\n- mtd: rawnand: fsl_elbc: Fix none ECC mode (git-fixes).\n- mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times (git-fixes).\n- mtd: rawnand: gpmi: validate controller clock rate (git-fixes).\n- mtd: rawnand: intel: Do not re-define NAND_DATA_IFACE_CHECK_ONLY (git-fixes).\n- mtd: rawnand: intel: Read the chip-select line from the correct OF node (git-fixes).\n- mtd: rawnand: intel: Remove undocumented compatible string (git-fixes).\n- mtd: rawnand: marvell: Use correct logic for nand-keep-config (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct() (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: spi-nor: fix spi_nor_spimem_setup_op() call in spi_nor_erase_{sector,chip}() (git-fixes).\n- mtd: spi-nor: intel-spi: Disable write protection only if asked (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).\n- musb: fix USB_MUSB_TUSB6010 dependency (git-fixes).\n- mwifiex: Ignore BTCOEX events from the 88W8897 firmware (git-fixes).\n- mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv (git-fixes).\n- n_gsm: remove unused parameters from gsm_error() (git-fixes).\n- nbd: Fix incorrect error handle when first_minor is illegal in nbd_dev_add (git-fixes).\n- net/dsa/hirschmann: Add missing of_node_get() in hellcreek_led_setup() (git-fixes).\n- net/ice: fix initializing the bitmap in the switch code (git-fixes).\n- net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).\n- net/mlx4_en: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5: CT: Fix header-rewrite re-use for tupels (git-fixes).\n- net/mlx5: Drain fw_reset when removing device (git-fixes).\n- net/mlx5e: Block rx-gro-hw feature in switchdev mode (git-fixes).\n- net/mlx5e: Disable softirq in mlx5e_activate_rq to avoid race condition (git-fixes).\n- net/mlx5e: Fix enabling sriov while tc nic rules are offloaded (git-fixes).\n- net/mlx5e: Properly block HW GRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly block LRO when XDP is enabled (git-fixes).\n- net/mlx5e: Properly disable vlan strip on non-UL reps (git-fixes).\n- net/mlx5e: Remove HW-GRO from reported features (git-fixes).\n- net/mlx5e: Remove WARN_ON when trying to offload an unsupported TLS cipher/version (git-fixes).\n- net/mlx5e: Ring the TX doorbell on DMA errors (git-fixes).\n- net/mlx5e: TC NIC mode, fix tc chains miss table (git-fixes).\n- net/mlx5e: TC, fix decap fallback to uplink when int port not supported (git-fixes).\n- net/mlx5e: Update netdev features after changing XDP state (git-fixes).\n- net/mlx5e: xsk: Account for XSK RQ UMRs when calculating ICOSQ size (git-fixes).\n- net/qla3xxx: Fix a test in ql_reset_work() (git-fixes).\n- net/smc: Avoid overwriting the copies of clcsock callback functions (git-fixes).\n- net/smc: Fix an error code in smc_lgr_create() (git-fixes).\n- net/smc: Fix possible access to freed memory in link clear (git-fixes).\n- net/smc: Fix possible leaked pernet namespace in smc_init() (git-fixes).\n- net/smc: Fix slab-out-of-bounds issue in fallback (git-fixes).\n- net/smc: Fix sock leak when release after smc_shutdown() (git-fixes).\n- net/smc: Forward wakeup to smc socket waitqueue after fallback (git-fixes).\n- net/smc: Only save the original clcsock callback functions (git-fixes).\n- net/smc: Send directly when TCP_CORK is cleared (git-fixes).\n- net/smc: kABI workarounds for struct smc_link (git-fixes).\n- net/smc: kABI workarounds for struct smc_sock (git-fixes).\n- net/smc: send directly on setting TCP_NODELAY (git-fixes).\n- net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change() (git-fixes).\n- net/x25: Fix skb leak in x25_lapb_receive_frame() (git-fixes).\n- net: altera: Fix refcount leak in altera_tse_mdio_create (git-fixes).\n- net: asix: fix 'can't send until first packet is send' issue (git-fixes).\n- net: atlantic: fix aq_vec index out of range error (git-fixes).\n- net: axienet: fix RX ring refill allocation failure handling (git-fixes).\n- net: axienet: reset core on initialization prior to MDIO access (git-fixes).\n- net: bcmgenet: Indicate MAC is in charge of PHY PM (git-fixes).\n- net: bcmgenet: Revert 'Use stronger register read/writes to assure ordering' (git-fixes).\n- net: bcmgenet: Use stronger register read/writes to assure ordering (git-fixes).\n- net: bcmgenet: hide status block before TX timestamping (git-fixes).\n- net: bgmac: Fix a BUG triggered by wrong bytes_compl (git-fixes).\n- net: bgmac: Fix an erroneous kfree() in bgmac_remove() (git-fixes).\n- net: bgmac: support MDIO described in DT (git-fixes).\n- net: bonding: fix possible NULL deref in rlb code (git-fixes).\n- net: bonding: fix use-after-free after 802.3ad slave unbind (git-fixes).\n- net: chelsio: cxgb4: Avoid potential negative array offset (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: dp83822: disable false carrier interrupt (git-fixes).\n- net: dp83822: disable rx error interrupt (git-fixes).\n- net: dsa: b53: Add SPI ID table (git-fixes).\n- net: dsa: bcm_sf2: Fix Wake-on-LAN with mac_link_down() (git-fixes).\n- net: dsa: bcm_sf2: force pause link settings (git-fixes).\n- net: dsa: bcm_sf2_cfp: fix an incorrect NULL check on list iterator (git-fixes).\n- net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering (git-fixes).\n- net: dsa: felix: fix tagging protocol changes with multiple CPU ports (git-fixes).\n- net: dsa: felix: purge skb from TX timestamping queue if it cannot be sent (git-fies).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: hellcreek: Add STP forwarding rule (git-fixes).\n- net: dsa: hellcreek: Add missing PTP via UDP rules (git-fixes).\n- net: dsa: hellcreek: Allow PTP P2P measurements on blocked ports (git-fixes).\n- net: dsa: hellcreek: Fix insertion of static FDB entries (git-fixes).\n- net: dsa: introduce helpers for iterating through ports using dp (git-fixes).\n- net: dsa: ksz9477: port mirror sniffing limited to one port (git-fixes).\n- net: dsa: lantiq_gswip: Do not set GSWIP_MII_CFG_RMII_CLK (git-fixes).\n- net: dsa: lantiq_gswip: Fix refcount leak in gswip_gphy_fw_list (git-fixes).\n- net: dsa: lantiq_gswip: fix use after free in gswip_remove() (git-fixes).\n- net: dsa: microchip: fix bridging with more than two member ports (git-fixes).\n- net: dsa: microchip: implement multi-bridge support (git-fixes).\n- net: dsa: microchip: ksz9477: fix fdb_dump last invalid entry (git-fixes).\n- net: dsa: microchip: ksz_common: Fix refcount leak bug (git-fixes).\n- net: dsa: mt7530: 1G can also support 1000BASE-X link mode (git-fixes).\n- net: dsa: mt7530: add missing of_node_put() in mt7530_setup() (git-fixes).\n- net: dsa: mv88e6060: prevent crash on an unused port (git-fixes).\n- net: dsa: mv88e6xxx: Add fix for erratum 5.2 of 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Drop unnecessary check in mv88e6393x_serdes_erratum_4_6() (git-fixes).\n- net: dsa: mv88e6xxx: Enable port policy support on 6097 (git-fixes).\n- net: dsa: mv88e6xxx: Fix application of erratum 4.8 for 88E6393X (git-fixes).\n- net: dsa: mv88e6xxx: Fix inband AN for 2500base-x on 88E6393X family (git-fixes).\n- net: dsa: mv88e6xxx: Fix port_hidden_wait to account for port_base_addr (git-fixes).\n- net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (git-fixes).\n- net: dsa: mv88e6xxx: Link in pcs_get_state() if AN is bypassed (git-fixes).\n- net: dsa: mv88e6xxx: Save power by disabling SerDes trasmitter and receiver (git-fixes).\n- net: dsa: mv88e6xxx: Unforce speed & duplex in mac_link_down() (git-fixes).\n- net: dsa: mv88e6xxx: allow use of PHYs on CPU and DSA ports (git-fixes).\n- net: dsa: mv88e6xxx: error handling for serdes_power functions (git-fixes).\n- net: dsa: mv88e6xxx: fix 'do not use PHY_DETECT on internal PHY's' (git-fixes).\n- net: dsa: mv88e6xxx: use BMSR_ANEGCOMPLETE bit for filling an_complete (git-fixes).\n- net: dsa: ocelot: seville: utilize of_mdiobus_register (git-fixes).\n- net: dsa: qca8k: fix MTU calculation (git-fixes).\n- net: dsa: restrict SMSC_LAN9303_I2C kconfig (git-fixes).\n- net: dsa: seville: register the mdiobus under devres (git-fixes).\n- net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions() (git-fixes).\n- net: dsa: sja1105: silent spi_device_id warnings (git-fixes).\n- net: dsa: tag_ocelot_8021q: break circular dependency with ocelot switch lib (git-fies).\n- net: dsa: vitesse-vsc73xx: silent spi_device_id warnings (git-fixes).\n- net: emaclite: Add error handling for of_address_to_resource() (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register (git-fixes).\n- net: ethernet: mediatek: ppe: fix wrong size passed to memset() (git-fixes).\n- net: ethernet: mv643xx: Fix over zealous checking of_get_mac_address() (git-fixes).\n- net: ethernet: nixge: fix NULL dereference (git-fixes).\n- net: ethernet: renesas: ravb: Fix promiscuous mode after system resumed (git-fixes).\n- net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link (git-fixes).\n- net: ethernet: stmmac: fix write to sgmii_adapter_base (git-fixes).\n- net: ethernet: ti: am65-cpsw: Fix devlink port register sequence (git-fixes).\n- net: ethernet: ti: am65-cpsw: fix error handling in am65_cpsw_nuss_probe() (git-fixes).\n- net: ethernet: ti: davinci_mdio: Add workaround for errata i2329 (git-fixes).\n- net: ethernet: ti: davinci_mdio: fix build for mdio bitbang uses (git-fixes).\n- net: fec: add missing of_node_put() in fec_enet_init_stop_mode() (git-fixes).\n- net: fix IFF_TX_SKB_NO_LINEAR definition (git-fixes).\n- net: ftgmac100: Hold reference returned by of_get_child_by_name() (git-fixes).\n- net: ftgmac100: access hardware register after clock ready (git-fixes).\n- net: hns3: add netdev reset check for hns3_set_tunable() (git-fixes).\n- net: hns3: clean residual vf config after disable sriov (git-fixes).\n- net: hns3: do not push link state to VF if unalive (git-fixes).\n- net: hns3: fix the concurrency between functions reading debugfs (git-fixes).\n- net: hns3: set port base vlan tbl_sta to false before removing old vlan (git-fixes).\n- net: huawei: hinic: Use devm_kcalloc() instead of devm_kzalloc() (git-fixes).\n- net: hyperv: remove use of bpf_op_t (git-fixes).\n- net: ieee802154: return -EINVAL for unknown addr type (git-fixes).\n- net: ipa: do not assume SMEM is page-aligned (git-fixes).\n- net: ipa: get rid of a duplicate initialization (git-fixes).\n- net: ipa: kill ipa_cmd_pipeline_clear() (git-fixes).\n- net: ipa: record proper RX transaction count (git-fixes).\n- net: ipvtap - add __init/__exit annotations to module init/exit funcs (git-fixes).\n- net: macb: Fix PTP one step sync support (git-fixes).\n- net: macb: Increment rx bd head after allocating skb and buffer (git-fixes).\n- net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa() (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- net: mana: Fix race on per-CQ variable napi work_done (git-fixes).\n- net: marvell: prestera: fix incorrect structure access (git-fixes).\n- net: mdio: Fix ENOMEM return value in BCM6368 mux bus controller (git-fixes).\n- net: mdio: fix unbalanced fwnode reference count in mdio_device_release() (git-fixes).\n- net: mdiobus: fix unbalanced node reference count (git-fixes).\n- net: moxa: get rid of asymmetry in DMA mapping/unmapping (git-fixes).\n- net: moxa: pass pdev instead of ndev to DMA functions (git-fixes).\n- net: mscc: ocelot: avoid corrupting hardware counters when moving VCAP filters (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: create a function that replaces an existing VCAP filter (git-fixes).\n- net: mscc: ocelot: do not dereference NULL pointers with shared tc filters (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mscc: ocelot: fix VCAP IS2 filters matching on both lookups (git-fixes).\n- net: mscc: ocelot: fix address of SYS_COUNT_TX_AGING counter (git-fixes).\n- net: mscc: ocelot: fix all IP traffic getting trapped to CPU with PTP over IP (git-fixes).\n- net: mscc: ocelot: fix broken IP multicast flooding (git-fixes).\n- net: mscc: ocelot: fix incorrect balancing with down LAG ports (git-fixes).\n- net: mscc: ocelot: fix last VCAP IS1/IS2 filter persisting in hardware when deleted (git-fixes).\n- net: mscc: ocelot: fix missing unlock on error in ocelot_hwstamp_set() (git-fixes).\n- net: mscc: ocelot: restrict tc-trap actions to VCAP IS2 lookup 0 (git-fixes).\n- net: mscc: ocelot: set up traps for PTP packets (git-fixes).\n- net: openvswitch: do not send internal clone attribute to the userspace (git-fixes).\n- net: openvswitch: fix leak of nested actions (git-fixes).\n- net: openvswitch: fix misuse of the cached connection on tuple changes (git-fixes).\n- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (git-fixes).\n- net: pcs: xpcs: propagate xpcs_read error to xpcs_get_state_c37_sgmii (git-fixes).\n- net: phy: Do not WARN for PHY_READY state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Do not WARN for PHY_UP state in mdio_bus_phy_resume() (git-fixes).\n- net: phy: Warn about incorrect mdio_bus_phy_resume() state (git-fixes).\n- net: phy: aquantia: wait for the suspend/resume operations to finish (git-fixes).\n- net: phy: at803x: move page selection fix to config_init (git-fixes).\n- net: phy: dp83822: disable MDI crossover status change interrupt (git-fixes).\n- net: phy: dp83867: Extend RX strap quirk for SGMII mode (git-fixes).\n- net: phy: fix null-ptr-deref while probe() failed (git-fixes).\n- net: phy: marvell: add sleep time after enabling the loopback bit (git-fixes).\n- net: phy: mscc: macsec: clear encryption keys when freeing a flow (git-fixes).\n- net: phy: smsc: Disable Energy Detect Power-Down in interrupt mode (git-fixes).\n- net: ptp: add a definition for the UDP port for IEEE 1588 general messages (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: smsc95xx: add support for Microchip EVB-LAN8670-USB (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: sparx5: depends on PTP_1588_CLOCK_OPTIONAL (git-fixes).\n- net: sparx5: uses, depends on BRIDGE or !BRIDGE (git-fixes).\n- net: stmmac: Fix unset max_speed difference between DT and non-DT platforms (git-fixes).\n- net: stmmac: Use readl_poll_timeout_atomic() in atomic state (git-fixes).\n- net: stmmac: clean up impossible condition (git-fixes).\n- net: stmmac: disable Split Header (SPH) for Intel platforms (bsc#1194904).\n- net: stmmac: dwc-qos: Disable split header for Tegra194 (bsc#1194904).\n- net: stmmac: dwmac-qcom-ethqos: Enable RGMII functional clock on resume (git-fixes).\n- net: stmmac: dwmac-qcom-ethqos: add platform level clocks management (git-fixes).\n- net: stmmac: dwmac-sun8i: add missing of_node_put() in sun8i_dwmac_register_mdio_mux() (git-fixes).\n- net: stmmac: enhance XDP ZC driver level switching performance (git-fixes).\n- net: stmmac: fix dma queue left shift overflow issue (git-fixes).\n- net: stmmac: fix leaks in probe (git-fixes).\n- net: stmmac: fix off-by-one error in sanity check (git-fixes).\n- net: stmmac: fix out-of-bounds access in a selftest (git-fixes).\n- net: stmmac: fix pm runtime issue in stmmac_dvr_remove() (git-fixes).\n- net: stmmac: fix unbalanced ptp clock issue in suspend/resume flow (git-fixes).\n- net: stmmac: only enable DMA interrupts when ready (git-fixes).\n- net: stmmac: perserve TX and RX coalesce value during XDP setup (git-fixes).\n- net: stmmac: remove redunctant disable xPCS EEE call (git-fixes).\n- net: stmmac: remove unused get_addr() callback (git-fixes).\n- net: stmmac: work around sporadic tx issue on link-up (git-fixes).\n- net: sungem_phy: Add of_node_put() for reference returned by of_get_parent() (git-fixes).\n- net: systemport: Fix an error handling path in bcm_sysport_probe() (git-fixes).\n- net: tap: NULL pointer derefence in dev_parse_header_protocol when skb->dev is null (git-fixes).\n- net: thunderbolt: Enable DMA paths only after rings are enabled (git-fixes).\n- net: thunderbolt: Fix error handling in tbnet_init() (git-fixes).\n- net: thunderbolt: fix memory leak in tbnet_open() (git-fixes).\n- net: thunderx: Fix the ACPI memory leak (git-fixes).\n- net: usb: Correct PHY handling of smsc95xx (git-fixes).\n- net: usb: Correct reset handling of smsc95xx (git-fixes).\n- net: usb: ax88179_178a needs FLAG_SEND_ZLP (git-fixes).\n- net: usb: ax88179_178a: add Allied Telesis AT-UMCs (git-fixes).\n- net: usb: make USB_RTL8153_ECM non user configurable (git-fixes).\n- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).\n- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).\n- net: usb: qmi_wwan: add Telit 0x103a composition (git-fixes).\n- net: usb: r8152: Add in new Devices that are supported for Mac-Passthru (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net: wwan: iosm: Call mutex_init before locking it (git-fixes).\n- net: wwan: iosm: fix dma_alloc_coherent incompatible pointer type (git-fixes).\n- net: wwan: iosm: fix kernel test robot reported error (git-fixes).\n- net: wwan: iosm: remove pointless null check (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- netdevsim: fib: Fix reference count leak on route deletion failure (git-fixes).\n- nfc/nci: fix race with opening and closing (git-fixes).\n- nfc: fdp: Fix potential memory leak in fdp_nci_send() (git-fixes).\n- nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send() (git-fixes).\n- nfc: nxp-nci: Fix potential memory leak in nxp_nci_send() (git-fixes).\n- nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout (git-fixes).\n- nfc: s3fwrn5: Fix potential memory leak in s3fwrn5_nci_send() (git-fixes).\n- nfc: st-nci: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st-nci: fix memory leaks in EVT_TRANSACTION (git-fixes).\n- nfp: ethtool: fix the display error of `ethtool -m DEVNAME` (git-fixes).\n- nfsd: eliminate the NFSD_FILE_BREAK_* flags (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() (git-fixes).\n- nilfs2: fix deadlock in nilfs_count_free_blocks() (git-fixes).\n- nilfs2: fix incorrect masking of permission flags for symlinks (git-fixes).\n- nilfs2: fix lockdep warnings during disk space reclamation (git-fixes).\n- nilfs2: fix lockdep warnings in page operations for btree nodes (git-fixes).\n- nilfs2: fix nilfs_sufile_mark_dirty() not set segment usage as dirty (git-fixes).\n- nilfs2: fix use-after-free bug of ns_writer on remount (git-fixes).\n- nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure (git-fixes).\n- nohz/full, sched/rt: Fix missed tick-reenabling bug in dequeue_task_rt() (bnc#1189999 (Scheduler functional and performance backports)).\n- nouveau/svm: Fix to migrate all requested pages (git-fixes).\n- nouveau: explicitly wait on the fence in nouveau_bo_move_m2mf (git-fies).\n- ntb_hw_amd: Add NTB PCI ID for new gen CPU (bsc#1202113).\n- nvme-auth: align to pre-upstream FFDHE implementation (bsc#1202265).\n- nvme-auth: retry command if DNR bit is not set (bsc#1201675).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme: consider also host_iface when checking ip options (bsc#1199670).\n- nvme: do not print verbose errors for internal passthrough requests (bsc#1202187).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvme: implement In-Band authentication (jsc#SLE-20183).\n- nvme: kabi fixes for in-band authentication (bsc#1199086).\n- nvmem: core: Check input parameter for NULL in nvmem_unregister() (bsc#1204241).\n- nvmet-auth: expire authentication sessions (jsc#SLE-20183).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- nvmet: implement basic In-Band Authentication (jsc#SLE-20183).\n- ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock (bsc#1202778).\n- ocfs2: fix a deadlock when commit trans (bsc#1202776).\n- octeontx2-af: Add KPU changes to parse NGIO as separate layer (jsc#SLE-24682).\n- octeontx2-af: Add PTP device id for CN10K and 95O silcons (jsc#SLE-24682).\n- octeontx2-af: Add SDP interface support (jsc#SLE-24682).\n- octeontx2-af: Add debug messages for failures (jsc#SLE-24682).\n- octeontx2-af: Add external ptp input clock (jsc#SLE-24682).\n- octeontx2-af: Add free rsrc count mbox msg (jsc#SLE-24682).\n- octeontx2-af: Add mbox to retrieve bandwidth profile free count (jsc#SLE-24682).\n- octeontx2-af: Add support to flush full CPT CTX cache (jsc#SLE-24682).\n- octeontx2-af: Adjust LA pointer for cpt parse header (jsc#SLE-24682).\n- octeontx2-af: Allocate low priority entries for PF (jsc#SLE-24682).\n- octeontx2-af: Allow to configure flow tag LSB byte as RSS adder (jsc#SLE-24682).\n- octeontx2-af: Apply tx nibble fixup always (git-fixes).\n- octeontx2-af: Change the order of queue work and interrupt disable (jsc#SLE-24682).\n- octeontx2-af: Do not enable Pause frames by default (jsc#SLE-24682).\n- octeontx2-af: Enable CPT HW interrupts (jsc#SLE-24682).\n- octeontx2-af: Enhance mailbox trace entry (jsc#SLE-24682).\n- octeontx2-af: Fix LBK backpressure id count (jsc#SLE-24682).\n- octeontx2-af: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-af: Fix interrupt name strings (jsc#SLE-24682).\n- octeontx2-af: Fix key checking for source mac (git-fixes).\n- octeontx2-af: Fix mcam entry resource leak (git-fixes).\n- octeontx2-af: Fix spelling mistake 'Makesure' -> 'Make sure' (jsc#SLE-24682).\n- octeontx2-af: Fix uninitialized variable val (jsc#SLE-24682).\n- octeontx2-af: Flow control resource management (jsc#SLE-24682).\n- octeontx2-af: Handle return value in block reset (jsc#SLE-24682).\n- octeontx2-af: Hardware configuration for inline IPsec (jsc#SLE-24682).\n- octeontx2-af: Increase link credit restore polling timeout (jsc#SLE-24682).\n- octeontx2-af: Increase number of reserved entries in KPU (jsc#SLE-24682).\n- octeontx2-af: Increment ptp refcount before use (jsc#SLE-24682).\n- octeontx2-af: Limit KPU parsing for GTPU packets (jsc#SLE-24682).\n- octeontx2-af: Modify install flow error codes (jsc#SLE-24682).\n- octeontx2-af: Optimize KPU1 processing for variable-length headers (jsc#SLE-24682).\n- octeontx2-af: Perform cpt lf teardown in non FLR path (jsc#SLE-24682).\n- octeontx2-af: Priority flow control configuration support (jsc#SLE-24682).\n- octeontx2-af: Remove channel verification while installing MCAM rules (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable blkaddr (jsc#SLE-24682).\n- octeontx2-af: Remove redundant initialization of variable pin (jsc#SLE-24682).\n- octeontx2-af: Reset PTP config in FLR handler (jsc#SLE-24682).\n- octeontx2-af: Retry until RVU block reset complete (jsc#SLE-24682).\n- octeontx2-af: Use DMA_ATTR_FORCE_CONTIGUOUS attribute in DMA alloc (jsc#SLE-24682).\n- octeontx2-af: Use NDC TX for transmit packet data (jsc#SLE-24682).\n- octeontx2-af: Use ptp input clock info from firmware data (jsc#SLE-24682).\n- octeontx2-af: Wait for TX link idle for credits change (jsc#SLE-24682).\n- octeontx2-af: add proper return codes for AF mailbox handlers (jsc#SLE-24682).\n- octeontx2-af: cn10K: Get NPC counters value (jsc#SLE-24682).\n- octeontx2-af: cn10K: support for sched lmtst and other features (jsc#SLE-24682).\n- octeontx2-af: cn10k: DWRR MTU configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: RPM hardware timestamp configuration (jsc#SLE-24682).\n- octeontx2-af: cn10k: Set cache lines for NPA batch alloc (jsc#SLE-24682).\n- octeontx2-af: cn10k: Use appropriate register for LMAC enable (jsc#SLE-24682).\n- octeontx2-af: cn10k: add workaround for ptp errata (jsc#SLE-24682).\n- octeontx2-af: cn10k: debugfs for dumping LMTST map table (jsc#SLE-24682).\n- octeontx2-af: configure npc for cn10k to allow packets from cpt (jsc#SLE-24682).\n- octeontx2-af: debugfs: Add channel and channel mask (jsc#SLE-24682).\n- octeontx2-af: debugfs: Minor changes (jsc#SLE-24682).\n- octeontx2-af: debugfs: do not corrupt user memory (jsc#SLE-24682).\n- octeontx2-af: debugfs: fix error return of allocations (jsc#SLE-24682).\n- octeontx2-af: enable tx shaping feature for 96xx C0 (jsc#SLE-24682).\n- octeontx2-af: fix array bound error (jsc#SLE-24682).\n- octeontx2-af: fix error code in is_valid_offset() (jsc#SLE-24682).\n- octeontx2-af: initialize action variable (jsc#SLE-24682).\n- octeontx2-af: nix and lbk in loop mode in 98xx (jsc#SLE-24682).\n- octeontx2-af: remove redudant second error check on variable err (jsc#SLE-24682).\n- octeontx2-af: suppress external profile loading warning (git-fixes).\n- octeontx2-af: use swap() to make code cleaner (jsc#SLE-24682).\n- octeontx2-af: verify CQ context updates (jsc#SLE-24682).\n- octeontx2-nic: fix mixed module build (jsc#SLE-24682).\n- octeontx2-nicvf: Add PTP hardware clock support to NIX VF (jsc#SLE-24682).\n- octeontx2-nicvf: Free VF PTP resources (jsc#SLE-24682).\n- octeontx2-pf: Add TC feature for VFs (jsc#SLE-24682).\n- octeontx2-pf: Add XDP support to netdev PF (jsc#SLE-24682).\n- octeontx2-pf: Add check for non zero mcam flows (jsc#SLE-24682).\n- octeontx2-pf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2-pf: Add vlan-etype to ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: Allow VLAN priority also in ntuple filters (jsc#SLE-24682).\n- octeontx2-pf: CN10K: Hide RPM stats over ethtool (jsc#SLE-24682).\n- octeontx2-pf: Do not mask out supported link modes (jsc#SLE-24682).\n- octeontx2-pf: Enable NETIF_F_RXALL support for VF driver (jsc#SLE-24682).\n- octeontx2-pf: Fix NIX_AF_TL3_TL2X_LINKX_CFG register configuration (git-fixes).\n- octeontx2-pf: Fix UDP/TCP src and dst port tc filters (git-fixes).\n- octeontx2-pf: Fix inconsistent license text (jsc#SLE-24682).\n- octeontx2-pf: Ntuple filters support for VF netdev (jsc#SLE-24682).\n- octeontx2-pf: PFC config support with DCBx (jsc#SLE-24682).\n- octeontx2-pf: Remove unnecessary synchronize_irq() before free_irq() (jsc#SLE-24682).\n- octeontx2-pf: Simplify the receive buffer size calculation (jsc#SLE-24682).\n- octeontx2-pf: Sort the allocated MCAM entry indices (jsc#SLE-24682).\n- octeontx2-pf: Unify flow management variables (jsc#SLE-24682).\n- octeontx2-pf: Use hardware register for CQE count (jsc#SLE-24682).\n- octeontx2-pf: cn10K: Reserve LMTST lines per core (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Config DWRR weight based on MTU (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Ensure valid pointers are freed to aura (jsc#SLE-24682).\n- octeontx2-pf: cn10k: Fix egress ratelimit configuration (git-fixes).\n- octeontx2-pf: cn10k: add support for new ptp timestamp format (jsc#SLE-24682).\n- octeontx2-pf: devlink params support to set mcam entry count (jsc#SLE-24682).\n- octeontx2-pf: replace bitmap_weight with bitmap_empty where appropriate (jsc#SLE-24682).\n- octeontx2-pf: select CONFIG_NET_DEVLINK (jsc#SLE-24682).\n- octeontx2-vf: Add support for adaptive interrupt coalescing (jsc#SLE-24682).\n- octeontx2: Move devlink registration to be last devlink command (jsc#SLE-24682).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- openvswitch: Fix double reporting of drops in dropwatch (git-fixes).\n- openvswitch: Fix overreporting of drops in dropwatch (git-fixes).\n- openvswitch: Fix setting ipv6 fields causing hw csum failure (git-fixes).\n- openvswitch: Fixed nd target mask field in the flow dump (git-fixes).\n- openvswitch: add nf_ct_is_confirmed check before assigning the helper (git-fixes).\n- openvswitch: always update flow key after nat (git-fixes).\n- openvswitch: switch from WARN to pr_warn (git-fixes).\n- optee: add error checks in optee_ffa_do_call_with_arg() (git-fixes).\n- overflow.h: restore __ab_c_size (git-fixes).\n- overflow: Implement size_t saturating arithmetic helpers (jsc#PED-1211).\n- pNFS/flexfiles: Report RDMA connection errors to the server (git-fixes).\n- padata: Fix list iterator in padata_do_serial() (git-fixes).\n- panic, kexec: make __crash_kexec() NMI safe (git-fixes).\n- parisc/sticon: fix reverse colors (bsc#1152489)\n- parisc/stifb: Fix fb_is_primary_device() only available with (bsc#1152489)\n- parisc/stifb: Implement fb_is_primary_device() (bsc#1152489)\n- parisc/stifb: Keep track of hardware path of graphics card (bsc#1152489)\n- parport_pc: Avoid FIFO port location truncation (git-fixes).\n- perf bench futex: Fix memory leak of perf_cpu_map__new() (git-fixes).\n- phy: amlogic: phy-meson-axg-mipi-pcie-analog: Hold reference returned by of_get_parent() (git-fixes).\n- phy: qualcomm: call clk_disable_unprepare in the error handling (git-fixes).\n- phy: ralink: mt7621-pci: add sentinel to quirks table (git-fixes).\n- phy: samsung: phy-exynos-pcie: sanitize init/power_on callbacks (git-fixes).\n- phy: stm32: fix an error code in probe (git-fixes).\n- phy: stm32: fix error return in stm32_usbphyc_phy_init (git-fixes).\n- pinctrl: Ingenic: JZ4755 bug fixes (git-fixes).\n- pinctrl: alderlake: Add Intel Alder Lake-N pin controller support (jsc#PED-676).\n- pinctrl: alderlake: Add Raptor Lake-S ACPI ID (jsc#PED-634).\n- pinctrl: alderlake: Fix register offsets for ADL-N variant (jsc#PED-676).\n- pinctrl: amd: Do not save/restore interrupt status and wake status bits (git-fixes).\n- pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).\n- pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback (git-fixes).\n- pinctrl: armada-37xx: Convert to use dev_err_probe() (git-fixes).\n- pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).\n- pinctrl: armada-37xx: Make use of the devm_platform_ioremap_resource() (git-fixes).\n- pinctrl: armada-37xx: Use temporary variable for struct device (git-fixes).\n- pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map (git-fixes).\n- pinctrl: intel: Check against matching data instead of ACPI companion (git-fixes).\n- pinctrl: intel: Save and restore pins in 'direct IRQ' mode (git-fixes).\n- pinctrl: microchip-sgpio: Correct the fwnode_irq_get() return value check (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: qcom: sc8180x: Fix gpio_wakeirq_map (git-fixes).\n- pinctrl: qcom: sc8180x: Fix wrong pin numbers (git-fixes).\n- pinctrl: qcom: sm8250: Fix PDC map (git-fixes).\n- pinctrl: rockchip: list all pins in a possible mux route for PX30 (git-fixes).\n- pinctrl: single: Fix potential division by zero (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- pinctrl: sunxi: Fix name for A100 R_PIO (git-fixes).\n- platform/chrome: cros_ec: Always expose last resume result (git-fixes).\n- platform/chrome: cros_ec: Notify the PM of wake events during resume (git-fixes).\n- platform/chrome: cros_ec_proto: Update version on GET_NEXT_EVENT failure (git-fixes).\n- platform/chrome: cros_ec_proto: do not show MKBP version if unsupported (git-fixes).\n- platform/chrome: cros_ec_typec: Correct alt mode index (git-fixes).\n- platform/chrome: fix double-free in chromeos_laptop_prepare() (git-fixes).\n- platform/chrome: fix memory corruption in ioctl (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/surface: aggregator: Do not check for repeated unsequenced packets (git-fixes).\n- platform/surface: aggregator_registry: Add support for Surface Laptop Go 2 (git-fixes).\n- platform/x86/intel/pmt: Sapphire Rapids PMT errata fix (jsc#PED-2684 bsc#1205683).\n- platform/x86/intel: hid: add quirk to support Surface Go 3 (git-fixes).\n- platform/x86/intel: pmc: Do not unconditionally attach Intel PMC when virtualized (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: acer-wmi: Enable SW_TABLET_MODE on Switch V 10 (SW5-017) (git-fixes).\n- platform/x86: asus-wmi: Document the dgpu_disable sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: Document the egpu_enable sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: Document the panel_od sysfs attribute (git-fixes).\n- platform/x86: asus-wmi: add missing pci_dev_put() in asus_wmi_set_xusb2pr() (git-fixes).\n- platform/x86: hp-wmi: Ignore Smart Experience App event (git-fixes).\n- platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi (git-fixes).\n- platform/x86: i2c-multi-instantiate: Rename it for a generic serial driver name (bsc#1203699).\n- platform/x86: ideapad-laptop: Disable touchpad_switch (git-fixes).\n- platform/x86: msi-laptop: Change DMI match / alias strings to fix module autoloading (git-fixes).\n- platform/x86: msi-laptop: Fix old-ec check for backlight registering (git-fixes).\n- platform/x86: msi-laptop: Fix resource cleanup (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- platform/x86: pmc_atom: Match all Lex BayTrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: serial-multi-instantiate: Add CLSA0101 Laptop (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Add SPI support (bsc#1203699).\n- platform/x86: serial-multi-instantiate: Reorganize I2C functions (bsc#1203699).\n- platform/x86: touchscreen_dmi: Add info for the RCA Cambio W101 v2 2-in-1 (git-fixes).\n- plip: avoid rcu debug splat (git-fixes).\n- power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() (git-fixes).\n- powerpc-pseries-mobility-set-NMI-watchdog-factor-dur.patch.\n- powerpc-watchdog-introduce-a-NMI-watchdog-s-factor.patch.\n- powerpc/64: Fix build failure with allyesconfig in book3s_64_entry.S (bsc#1194869).\n- powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).\n- powerpc/64: pcpu setup avoid reading mmu_linear_psize on 64e or radix (bsc#1204413 ltc#200176).\n- powerpc/64s: Fix build failure when CONFIG_PPC_64S_HASH_MMU is not set (bsc#1204413 ltc#200176).\n- powerpc/64s: Make flush_and_reload_slb a no-op when radix is enabled (bsc#1204413 ltc#200176).\n- powerpc/64s: Make hash MMU support configurable (bsc#1204413 ltc#200176).\n- powerpc/64s: Move and rename do_bad_slb_fault as it is not hash specific (bsc#1204413 ltc#200176).\n- powerpc/64s: Move hash MMU support code under CONFIG_PPC_64S_HASH_MMU (bsc#1204413 ltc#200176).\n- powerpc/64s: Rename hash_hugetlbpage.c to hugetlbpage.c (bsc#1204413 ltc#200176).\n- powerpc/boot: Explicitly disable usage of SPE instructions (bsc#1156395).\n- powerpc/fadump: align destination address to pagesize (bsc#1204728 ltc#200074).\n- powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() (jsc#SLE-13847 git-fixes).\n- powerpc/kvm: Fix kvm_use_magic_page (bsc#1156395).\n- powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).\n- powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: add missing of_node_put() in opal_export_attrs() (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/pseries/vas: Add VAS IRQ primary handler (bsc#1204413 ltc#200176).\n- powerpc/pseries/vas: Declare pseries_vas_fault_thread_fn() as static (bsc#1194869).\n- powerpc/pseries/vas: Pass hw_cpu_id to node associativity HCALL (bsc#1194869).\n- powerpc/pseries: Interface to represent PAPR firmware attributes (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Rename TYPE1_AFFINITY to FORM1_AFFINITY (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: Stop selecting PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176).\n- powerpc/pseries: lparcfg do not include slb_size line in radix mode (bsc#1204413 ltc#200176).\n- powerpc/pseries: rename min_common_depth to primary_domain_index (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- powerpc: Avoid discarding flags in system_call_exception() (bsc#1194869).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: Ignore DSI error caused by the copy/paste instruction (bsc#1204413 ltc#200176).\n- powerpc: Rename PPC_NATIVE to PPC_HASH_MMU_NATIVE (bsc#1204413 ltc#200176). Update config files.\n- powerpc: make memremap_compat_align 64s-only (bsc#1204413 ltc#200176).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- printk: add missing memory barrier to wake_up_klogd() (bsc#1204934).\n- printk: use atomic updates for klogd work (bsc#1204934).\n- printk: wake waiters for safe and NMI contexts (bsc#1204934).\n- proc: avoid integer type confusion in get_proc_long (git-fixes).\n- proc: fix a dentry lock race between release_task and lookup (git-fixes).\n- proc: fix dentry/inode overinstantiating under /proc/${pid}/net (git-fixes).\n- proc: proc_skip_spaces() shouldn't think it is working on C strings (git-fixes).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- pwm: lpc18xx-sct: Reduce number of devm memory allocations (git-fixes).\n- pwm: lpc18xx-sct: Simplify driver by not using pwm_[gs]et_chip_data() (git-fixes).\n- pwm: lpc18xx: Fix period handling (git-fixes).\n- qed: validate and restrict untrusted VFs vlan promisc mode (git-fixes).\n- r8152: add PID for the Lenovo OneLink+ Dock (git-fixes).\n- r8152: fix the RX FIFO settings when suspending (git-fixes).\n- r8152: fix the units of some registers for RTL8156A (git-fixes).\n- random: remove useless header comment (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- rbd: fix possible memory leak in rbd_sysfs_init() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: core: Prevent integer underflow (git-fixes).\n- regulator: core: fix UAF in destroy_regulator() (git-fixes).\n- regulator: core: fix kobject release warning and memory leak in regulator_register() (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- regulator: pca9450: Remove restrictions for regulator-name (git-fixes).\n- regulator: pfuze100: Fix the global-out-of-bounds access in pfuze100_regulator_probe() (git-fixes).\n- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).\n- regulator: qcom_smd: Fix pm8916_pldo range (git-fixes).\n- regulator: twl6030: re-add TWL6032_SUBCLASS (git-fixes).\n- remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init (git-fixes).\n- remoteproc: imx_rproc: Simplify some error message (git-fixes).\n- remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init (git-fixes).\n- remoteproc: qcom: pas: Check if coredump is enabled (git-fixes).\n- remoteproc: qcom: pas: Mark devices as wakeup capable (git-fixes).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- remoteproc: sysmon: Wait for SSCTL service to come up (git-fixes).\n- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).\n- restore m_can_lec_type (git-fixes).\n- ring-buffer: Add ring_buffer_wake_waiters() (git-fixes).\n- ring-buffer: Allow splice to read previous partially read pages (git-fixes).\n- ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() (bsc#1204705).\n- ring-buffer: Check pending waiters when doing wake ups as well (git-fixes).\n- ring-buffer: Fix race between reset page and reading page (git-fixes).\n- ring-buffer: Have the shortest_full queue be the shortest not longest (git-fixes).\n- ring-buffer: Include dropped pages in counting dirty patches (git-fixes).\n- ring_buffer: Do not deactivate non-existant pages (git-fixes).\n- rose: Fix NULL pointer dereference in rose_send_frame() (git-fixes).\n- rose: check NULL rose_loopback_neigh->loopback (git-fixes).\n- rpm/check-for-config-changes: add TOOLCHAIN_HAS_* to IGNORED_CONFIGS_RE This new form was added in commit b8c86872d1dc (riscv: fix detection of toolchain Zicbom support).\n- rpm/check-for-config-changes: loosen pattern for AS_HAS_* This is needed to handle CONFIG_AS_HAS_NON_CONST_LEB128.\n- rpm/kernel-binary.spec.in: move vdso to a separate package (bsc#1202385) We do the move only on 15.5+.\n- rpm/kernel-binary.spec.in: simplify find for usrmerged The type test and print line are the same for both cases. The usrmerged case only ignores more, so refactor it to make it more obvious.\n- rpm/kernel-source.spec.in: simplify finding of broken symlinks 'find -xtype l' will report them, so use that to make the search a bit faster (without using shell).\n- rpmsg: char: Add mutex protection for rpmsg_eptdev_open() (git-fixes).\n- rpmsg: mtk_rpmsg: Fix circular locking dependency (git-fixes).\n- rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).\n- rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge (git-fixes).\n- rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register() (git-fixes).\n- rtmutex: Add acquire semantics for rtmutex lock acquisition slow path (bnc#1203829).\n- s390/boot: add secure boot trailer (bsc#1205257 LTC#200451).\n- s390/boot: fix absolute zero lowcore corruption on boot (git-fixes).\n- s390/cpumf: Handle events cycles and instructions identical (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup (git-fixes).\n- s390/futex: add missing EX_TABLE entry to __futex_atomic_op() (bsc#1205427 LTC#200502).\n- s390/hugetlb: fix prepare_hugepage_range() check for 2 GB hugepages (git-fixes).\n- s390/hypfs: avoid error message under KVM (bsc#1032323).\n- s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: use non-quiescing sske for KVM switch to keyed guest (git-fixes).\n- s390/pci: add missing EX_TABLE entries to __pcistg_mio_inuser()/__pcilg_mio_inuser() (bsc#1205427 LTC#200502).\n- s390/qeth: cache link_info for ethtool (bsc#1202262 LTC#199322).\n- s390/smp: enforce lowcore protection on CPU restart (git-fixes).\n- s390/stp: clock_delta should be signed (git-fixes).\n- s390/uaccess: add missing EX_TABLE entries to __clear_user(), copy_in_user_mvcos(), copy_in_user_mvc(), clear_user_xc() and __strnlen_user() (bsc#1205428 LTC#200501).\n- s390/zcore: fix race when reading from hardware system area (git-fixes).\n- s390: fix double free of GS and RI CBs on fork() failure (bsc#1203197 LTC#199895).\n- s390: fix nospec table alignments (git-fixes).\n- samples/landlock: Add clang-format exceptions (git-fixes).\n- samples/landlock: Fix path_list memory leak (git-fixes).\n- samples/landlock: Format with clang-format (git-fixes).\n- sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up() (git-fixes).\n- sbitmap: fix possible io hung due to lost wakeup (git-fixes).\n- sched-core-Do-not-requeue-task-on-CPU-excluded-from-cpus_mask.patch\n- sched/core: Always flush pending blk_plug (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (git-fixes)\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq -kabi (git fixes (sched/fair)).\n- sched/fair: Remove redundant word ' *' (bnc#1189999 (Scheduler functional and performance backports)).\n- sched/uclamp: Fix iowait boost escaping uclamp restriction (git-fixes)\n- sched/uclamp: Fix rq->uclamp_max not set on first enqueue (git-fixes)\n- sched: Allow newidle balancing to bail out of load_balance (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Clear ttwu_pending after enqueue_task() (git fixes (sched/core)).\n- sched: Disable sched domain debugfs creation on ppc64 unless sched_verbose is specified (bnc#1205653).\n- sched: Fix the check of nr_running at queue wakelist (bnc#1189999 (Scheduler functional and performance backports)).\n- sched: Remove the limitation of WF_ON_CPU on wakelist if wakee cpu is idle (bnc#1189999 (Scheduler functional and performance backports)). Refresh\n- sched: Remove unused function group_first_cpu() (bnc#1189999 (Scheduler functional and performance backports)).\n- scripts/dtc: Call pkg-config POSIXly correct (git-fixes).\n- scripts/faddr2line: Fix regression in name resolution on ppc64le (git-fixes).\n- scripts/faddr2line: Fix vmlinux detection on arm64 (git-fixes).\n- scripts/gdb: change kernel config dumping method (git-fixes).\n- scripts: sphinx-pre-install: Fix ctex support on Debian (git-fixes).\n- scripts: sphinx-pre-install: add required ctex dependency (git-fixes).\n- scsi: Revert 'scsi: qla2xxx: Fix disk failure to rediscover' (git-fixes).\n- scsi: core: Add BLIST_NO_ASK_VPD_SIZE for some VDASD (bsc#1203039).\n- scsi: hisi_sas: Keep controller active between ISR of phyup and the event being processed (bsc#1202471).\n- scsi: hisi_sas: Use autosuspend for the host controller (bsc#1202471).\n- scsi: ibmvfc: Avoid path failures during live migration (bsc#1065729).\n- scsi: ibmvscsis: Increase INITIAL_SRP_LIMIT to 1024 (bsc#1156395).\n- scsi: libiscsi: Add iscsi_cls_conn to sysfs after initialization (bsc#1198410).\n- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.5 patches (bsc#1201956).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Create a sysfs entry called lpfc_xcvr_data for transceiver info (bsc#1204957).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix attempted FA-PWWN usage after feature disable (bsc#1201956).\n- scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs (bsc#1204957).\n- scsi: lpfc: Fix lost NVMe paths during LIF bounce stress test (bsc#1201956).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix memory leak in lpfc_create_port() (bsc#1204957).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE (bsc#1201956).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix spelling mistake 'unsolicted' -> 'unsolicited' (bsc#1204957).\n- scsi: lpfc: Fix uninitialized cqe field in lpfc_nvme_cancel_iocb() (bsc#1201956).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Log when congestion management limits are in effect (bsc#1204957).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939). Dropped: patches.suse/lpfc-decouple-port_template-and-vport_template.patch\n- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input (bsc#1201956).\n- scsi: lpfc: Refactor lpfc_nvmet_prep_abort_wqe() into lpfc_sli_prep_abort_xri() (bsc#1201956).\n- scsi: lpfc: Remove Menlo/Hornet related code (bsc#1201956).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove extra atomic_inc on cmd_pending in queuecommand after VMID (bsc#1201956).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Revert RSCN_MEMENTO workaround for misbehaved configuration (bsc#1201956).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Set PU field when providing D_ID in XMIT_ELS_RSP64_CX iocb (bsc#1201956).\n- scsi: lpfc: Set sli4_param's cmf option to zero when CMF is turned off (bsc#1204957).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.5 (bsc#1201956).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.8 (bsc#1204957).\n- scsi: lpfc: Update the obsolete adapter list (bsc#1204142).\n- scsi: megaraid: Clear READ queue map's nr_queues (git-fixes).\n- scsi: megaraid_sas: Correct value passed to scsi_device_lookup() (git-fixes).\n- scsi: mpi3mr: Schedule IRQ kthreads only on non-RT kernels (bnc#1204498).\n- scsi: mpt3sas: Fix return value check of dma_get_required_mask() (git-fixes).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown (git-fixes).\n- scsi: qedf: Populate sysfs attributes for vport (git-fixes).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Check correct variable in qla24xx_async_gffid() (bsc#1201958).\n- scsi: qla2xxx: Define static symbols (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Enhance driver tracing with separate tunable and more (bsc#1203935).\n- scsi: qla2xxx: Fix discovery issues in FC-AL topology (bsc#1201958).\n- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).\n- scsi: qla2xxx: Fix imbalance vha->vref_count (bsc#1201958).\n- scsi: qla2xxx: Fix incorrect display of max frame size (bsc#1201958).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1201958).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Fix serialization of DCBX TLV data request (bsc#1204963).\n- scsi: qla2xxx: Fix sparse warning for dport_data (bsc#1201958).\n- scsi: qla2xxx: Fix spelling mistake 'definiton' -> 'definition' (bsc#1203935).\n- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).\n- scsi: qla2xxx: Update manufacturer details (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.800-k (bsc#1201958).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: qla2xxx: Use transport-defined speed mask for supported_speeds (bsc#1204963).\n- scsi: qla2xxx: Zero undefined mailbox IN registers (bsc#1201958).\n- scsi: qla2xxx: edif: Fix dropped IKE message (bsc#1201958).\n- scsi: scsi_transport_fc: Use %u for dev_loss_tmo (bsc#1202914).\n- scsi: scsi_transport_sas: Fix error handling in sas_phy_add() (git-fixes).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Add module param to disable managed ints (bsc#1203893).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: storvsc: Drop DID_TARGET_FAILURE use (git-fixes).\n- scsi: storvsc: Fix handling of srb_status and capacity change events (git-fixes).\n- scsi: storvsc: Fix typo in comment (git-fixes).\n- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq (git-fixes).\n- scsi: storvsc: remove an extraneous 'to' in a comment (git-fixes).\n- scsi: ufs: core: Fix another task management completion race (git-fixes).\n- scsi: ufs: core: Fix task management completion timeout race (git-fixes).\n- scsi: ufs: ufs-pci: Add support for Intel ADL (jsc#PED-707).\n- scsi: ufs: ufs-pci: Add support for Intel MTL (jsc#PED-732).\n- scsi: zfcp: Fix double free of FSF request when qdio send fails (git-fixes).\n- scsi: zfcp: Fix missing auto port scan and thus missing target ports (git-fixes).\n- seccomp: Invalidate seccomp mode to catch death failures (git-fixes).\n- selftest/net/forwarding: declare NETIFS p9 p10 (git-fixes).\n- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465 ltc#197256 jsc#SLE-18130).\n- selftest/vm: fix map_fixed_noreplace test failure (git-fixes).\n- selftest/vm: verify mmap addr in mremap_test (git-fixes).\n- selftest/vm: verify remap destination address in mremap_test (git-fixes).\n- selftest: tpm2: Add Client.__del__() to close /dev/tpm* handle (git-fixes).\n- selftests, x86: fix how check_cc.sh is being invoked (git-fixes).\n- selftests/exec: Add non-regular to TEST_GEN_PROGS (git-fixes).\n- selftests/exec: Remove pipe from TEST_GEN_FILES (git-fixes).\n- selftests/fib_tests: Rework fib_rp_filter_test() (git-fixes).\n- selftests/ftrace: Do not trace do_softirq because of PREEMPT_RT (git-fixes).\n- selftests/ftrace: make kprobe profile testcase description unique (git-fixes).\n- selftests/intel_pstate: fix build for ARCH=x86_64 (git-fixes).\n- selftests/landlock: Add clang-format exceptions (git-fixes).\n- selftests/landlock: Add tests for O_PATH (git-fixes).\n- selftests/landlock: Add tests for unknown access rights (git-fixes).\n- selftests/landlock: Extend access right tests to directories (git-fixes).\n- selftests/landlock: Extend tests for minimal valid attribute size (git-fixes).\n- selftests/landlock: Format with clang-format (git-fixes).\n- selftests/landlock: Fully test file rename with 'remove' access (git-fixes).\n- selftests/landlock: Make tests build with old libc (git-fixes).\n- selftests/landlock: Normalize array assignment (git-fixes).\n- selftests/landlock: Test landlock_create_ruleset(2) argument check ordering (git-fixes).\n- selftests/livepatch: better synchronize test_klp_callbacks_busy (bsc#1071995).\n- selftests/memfd: clean up mapping in mfd_fail_write (git-fixes).\n- selftests/memfd: remove unused variable (git-fixes).\n- selftests/net: pass ipv6_args to udpgso_bench's IPv6 TCP test (git-fixes).\n- selftests/net: so_txtime: fix parsing of start time stamp on 32 bit systems (git-fixes).\n- selftests/net: so_txtime: usage(): fix documentation of default clock (git-fixes).\n- selftests/net: timestamping: Fix bind_phc check (git-fixes).\n- selftests/net: udpgso_bench_tx: fix dst ip argument (git-fixes).\n- selftests/pidfd_test: Remove the erroneous ',' (git-fixes).\n- selftests/powerpc/spectre_v2: Return skip code when miss_percent is high (git-fixes).\n- selftests/powerpc: Add a test of sigreturning to the kernel (git-fixes).\n- selftests/powerpc: Skip energy_scale_info test on older firmware (git-fixes).\n- selftests/resctrl: Fix null pointer dereference on open failed (git-fixes).\n- selftests/rseq: Change type of rseq_offset to ptrdiff_t (git-fixes).\n- selftests/rseq: Fix ppc32 missing instruction selection 'u' and 'x' for load/store (git-fixes).\n- selftests/rseq: Fix ppc32 offsets by using long rather than off_t (git-fixes).\n- selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian (git-fixes).\n- selftests/rseq: Fix warnings about #if checks of undefined tokens (git-fixes).\n- selftests/rseq: Fix: work-around asm goto compiler bugs (git-fixes).\n- selftests/rseq: Introduce rseq_get_abi() helper (git-fixes).\n- selftests/rseq: Introduce thread pointer getters (git-fixes).\n- selftests/rseq: Remove arm/mips asm goto compiler work-around (git-fixes).\n- selftests/rseq: Remove useless assignment to cpu variable (git-fixes).\n- selftests/rseq: Remove volatile from __rseq_abi (git-fixes).\n- selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35 (git-fixes).\n- selftests/rseq: introduce own copy of rseq uapi header (git-fixes).\n- selftests/rseq: remove ARRAY_SIZE define from individual tests (git-fixes).\n- selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread area (git-fixes).\n- selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread area (git-fixes).\n- selftests/seccomp: Do not call read() on TTY from background pgrp (git-fixes).\n- selftests/seccomp: Fix compile warning when CC=clang (git-fixes).\n- selftests/seccomp: Fix seccomp failure by adding missing headers (git-fixes).\n- selftests/sgx: Treat CC as one argument (git-fixes).\n- selftests/vm/transhuge-stress: fix ram size thinko (git-fixes).\n- selftests/vm: make charge_reserved_hugetlb.sh work with existing cgroup setting (git-fixes).\n- selftests/x86: Add validity check and allow field splitting (git-fixes).\n- selftests/zram01.sh: Fix compression ratio calculation (git-fixes).\n- selftests/zram: Adapt the situation that /dev/zram0 is being used (git-fixes).\n- selftests/zram: Skip max_comp_streams interface on newer kernel (git-fixes).\n- selftests: Add duplicate config only for MD5 VRF tests (git-fixes).\n- selftests: Fix IPv6 address bind tests (git-fixes).\n- selftests: Fix raw socket bind tests with VRF (git-fixes).\n- selftests: Fix the if conditions of in test_extra_filter() (git-fixes).\n- selftests: add ping test with ping_group_range tuned (git-fixes).\n- selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644 (git-fixes).\n- selftests: cgroup: Test open-time cgroup namespace usage for migration checks (git-fixes).\n- selftests: cgroup: Test open-time credential usage for migration checks (git-fixes).\n- selftests: clone3: clone3: add case CLONE3_ARGS_NO_TEST (git-fixes).\n- selftests: fixup build warnings in pidfd / clone3 tests (git-fixes).\n- selftests: forwarding: Fix failing tests with old libnet (git-fixes).\n- selftests: forwarding: add shebang for sch_red.sh (git-fixes).\n- selftests: forwarding: fix error message in learning_test (git-fixes).\n- selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT (git-fixes).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- selftests: gpio: fix gpio compiling error (git-fixes).\n- selftests: harness: avoid false negatives if test has no ASSERTs (git-fixes).\n- selftests: icmp_redirect: pass xfail=0 to log_test() (git-fixes).\n- selftests: kvm: set rax before vmcall (git-fixes).\n- selftests: mirror_gre_bridge_1q: Avoid changing PVID while interface is operational (git-fixes).\n- selftests: mlxsw: resource_scale: Fix return value (git-fixes).\n- selftests: mlxsw: tc_police_scale: Make test more robust (git-fixes).\n- selftests: mlxsw: vxlan_flooding: Prevent flooding of unwanted packets (git-fixes).\n- selftests: mptcp: add csum mib check for mptcp_connect (git-fixes).\n- selftests: mptcp: fix diag instability (git-fixes).\n- selftests: mptcp: fix ipv6 routing setup (git-fixes).\n- selftests: mptcp: fix mibit vs mbit mix up (git-fixes).\n- selftests: mptcp: make sendfile selftest work (git-fixes).\n- selftests: mptcp: more stable diag tests (git-fixes).\n- selftests: mptcp: more stable simult_flows tests (git-fixes).\n- selftests: net: Correct case name (git-fixes).\n- selftests: net: Correct ping6 expected rc from 2 to 1 (git-fixes).\n- selftests: net: Fix a typo in udpgro_fwd.sh (git-fixes).\n- selftests: net: tls: remove unused variable and code (git-fixes).\n- selftests: net: udpgro_fwd.sh: explicitly checking the available ping feature (git-fixes).\n- selftests: net: using ping6 for IPv6 in udpgro_fwd.sh (git-fixes).\n- selftests: netfilter: Fix nft_fib.sh for all.rp_filter=1 (git-fixes).\n- selftests: netfilter: add a vrf+conntrack testcase (git-fixes).\n- selftests: netfilter: correct PKTGEN_SCRIPT_PATHS in nft_concat_range.sh (git-fixes).\n- selftests: netfilter: disable rp_filter on router (git-fixes).\n- selftests: netfilter: fix exit value for nft_concat_range (git-fixes).\n- selftests: nft_concat_range: add test for reload with no element add/del (git-fixes).\n- selftests: ocelot: tc_flower_chains: specify conform-exceed action for policer (git-fixes).\n- selftests: openat2: Add missing dependency in Makefile (git-fixes).\n- selftests: openat2: Print also errno in failure messages (git-fixes).\n- selftests: openat2: Skip testcases that fail with EOPNOTSUPP (git-fixes).\n- selftests: pmtu.sh: Kill nettest processes launched in subshell (git-fixes).\n- selftests: pmtu.sh: Kill tcpdump processes launched by subshell (git-fixes).\n- selftests: rtc: Increase test timeout so that all tests run (git-fixes).\n- selftests: rtnetlink: correct xfrm policy rule in kci_test_ipsec_offload (git-fixes).\n- selftests: skip mincore.check_file_mmap when fs lacks needed support (git-fixes).\n- selftests: test_vxlan_under_vrf: Fix broken test case (git-fixes).\n- selftests: timers: clocksource-switch: fix passing errors from child (git-fixes).\n- selftests: timers: valid-adjtimex: build fix for newer toolchains (git-fixes).\n- selftests: vm: Makefile: rename TARGETS to VMTARGETS (git-fixes).\n- selftests: vm: fix clang build error multiple output files (git-fixes).\n- selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() (git-fixes).\n- selinux: Add boundary check in put_entry() (git-fixes).\n- selinux: access superblock_security_struct in LSM blob way (git-fixes).\n- selinux: allow FIOCLEX and FIONCLEX with policy capability (git-fixes).\n- selinux: check return value of sel_make_avc_files (git-fixes).\n- selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() (git-fixes).\n- selinux: fix bad cleanup on error in hashtab_duplicate() (git-fixes).\n- selinux: fix double free of cond_list on error paths (git-fixes).\n- selinux: fix memleak in security_read_state_kernel() (git-fixes).\n- selinux: fix misuse of mutex_is_locked() (git-fixes).\n- selinux: use 'grep -E' instead of 'egrep' (git-fixes).\n- selinux: use correct type for context length (git-fixes).\n- serial: 8250: 8250_omap: Avoid RS485 RTS glitch on ->set_termios() (git-fixes).\n- serial: 8250: Add proper clock handling for OxSemi PCIe devices (git-fixes).\n- serial: 8250: Export ICR access helpers for internal use (git-fixes).\n- serial: 8250: Fall back to non-DMA Rx if IIR_RDI occurs (git-fixes).\n- serial: 8250: Fix restoring termios speed after suspend (git-fixes).\n- serial: 8250: Flush DMA Rx on RLSI (git-fixes).\n- serial: 8250: Fold EndRun device support into OxSemi Tornado code (git-fixes).\n- serial: 8250: omap: Fix unpaired pm_runtime_put_sync() in omap8250_remove() (git-fixes).\n- serial: 8250: omap: Flush PM QOS work on remove (git-fixes).\n- serial: 8250_bcm7271: Save/restore RTS in suspend/resume (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: 8250_fsl: Do not report FE, PE and OE twice (git-fixes).\n- serial: 8250_lpss: Configure DMA also w/o DMA filter (git-fixes).\n- serial: 8250_omap: remove wait loop from Errata i202 workaround (git-fixes).\n- serial: 8250_pci: Refactor the loop in pci_ite887x_init() (git-fixes).\n- serial: 8250_pci: Replace dev_*() by pci_*() macros (git-fixes).\n- serial: Create uart_xmit_advance() (git-fixes).\n- serial: atmel: remove redundant assignment in rs485_config (git-fixes).\n- serial: core: move RS485 configuration tasks from drivers into core (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: fsl_lpuart: Reset prior to registration (git-fixes).\n- serial: imx: Add missing .thaw_noirq hook (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting (git-fixes).\n- sfc: disable softirqs for ptp TX (git-fixes).\n- sfc: fix kernel panic when creating VF (git-fixes).\n- sfc: fix use after free when disabling sriov (git-fixes).\n- signal: break out of wait loops on kthread_stop() (bsc#1204926).\n- siox: fix possible memory leak in siox_device_add() (git-fixes).\n- slimbus: qcom-ngd: cleanup in probe error path (git-fixes).\n- slimbus: qcom-ngd: use correct error in message of pdr_add_lookup() failure (git-fixes).\n- slimbus: stream: correct presence rate frequencies (git-fixes).\n- smb2: small refactor in smb2_check_message() (bsc#1193629).\n- smb3: Move the flush out of smb2_copychunk_range() into its callers (bsc#1193629).\n- smb3: add dynamic trace points for tree disconnect (bsc#1193629).\n- smb3: add trace point for SMB2_set_eof (bsc#1193629).\n- smb3: allow deferred close timeout to be configurable (bsc#1193629).\n- smb3: check xattr value length earlier (bsc#1193629).\n- smb3: clarify multichannel warning (bsc#1193629).\n- smb3: do not log confusing message when server returns no network interfaces (bsc#1193629).\n- smb3: fix empty netname context on secondary channels (bsc#1193629).\n- smb3: fix oops in calculating shash_setkey (bsc#1193629).\n- smb3: fix temporary data corruption in collapse range (bsc#1193629).\n- smb3: fix temporary data corruption in insert range (bsc#1193629).\n- smb3: improve SMB3 change notification support (bsc#1193629).\n- smb3: interface count displayed incorrectly (bsc#1193629).\n- smb3: missing inode locks in punch hole (bsc#1193629).\n- smb3: missing inode locks in zero range (bsc#1193629).\n- smb3: must initialize two ACL struct fields to zero (bsc#1193629).\n- smb3: remove unneeded null check in cifs_readdir (bsc#1193629).\n- smb3: rename encryption/decryption TFMs (bsc#1193629).\n- smb3: use filemap_write_and_wait_range instead of filemap_write_and_wait (bsc#1193629).\n- smb3: use netname when available on secondary channels (bsc#1193629).\n- smb3: workaround negprot bug in some Samba servers (bsc#1193629).\n- smsc95xx: Ignore -ENODEV errors when device is unplugged (git-fixes).\n- soc/tegra: fuse: Drop Kconfig dependency on TEGRA20_APB_DMA (git-fixes).\n- soc: amlogic: Fix refcount leak in meson-secure-pwrc.c (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soc: fsl: select FSL_GUTS driver for DPIO (git-fixes).\n- soc: imx8m: Enable OCOTP clock before reading the register (git-fixes).\n- soc: imx: gpcv2: Assert reset before ungating clock (git-fixes).\n- soc: qcom: Make QCOM_RPMPD depend on PM (git-fixes).\n- soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register (git-fixes).\n- soc: qcom: ocmem: Fix refcount leak in of_get_ocmem (git-fixes).\n- soc: qcom: smem_state: Add refcounting for the 'state->of_node' (git-fixes).\n- soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).\n- soc: renesas: r8a779a0-sysc: Fix A2DP1 and A2CV[2357] PDR values (git-fixes).\n- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).\n- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).\n- soc: sunxi: sram: Fix probe function ordering issues (git-fixes).\n- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).\n- soc: sunxi_sram: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- soundwire: cadence: Do not overwrite msg->buf during write commands (git-fixes).\n- soundwire: intel: Initialize clock stop timeout (bsc#1205507).\n- soundwire: intel: fix error handling on dai registration issues (git-fixes).\n- soundwire: qcom: Check device status before reading devid (git-fixes).\n- soundwire: qcom: check for outanding writes before doing a read (git-fixes).\n- soundwire: qcom: fix device status array range (git-fixes).\n- soundwire: qcom: reinit broadcast completion (git-fixes).\n- speakup: fix a segfault caused by switching consoles (git-fixes).\n- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe (git-fixes).\n- spi: Add API to count spi acpi resources (bsc#1203699).\n- spi: Create helper API to lookup ACPI info for spi device (bsc#1203699).\n- spi: Ensure that sg_table won't be used after being freed (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: Fix simplification of devm_spi_register_controller (git-fixes).\n- spi: Return deferred probe error when controller isn't yet available (bsc#1203699).\n- spi: Support selection of the index of the ACPI Spi Resource before alloc (bsc#1203699).\n- spi: dt-bindings: cadence: add missing 'required' (git-fixes).\n- spi: dt-bindings: zynqmp-qspi: add missing 'required' (git-fixes).\n- spi: dw-dma: decrease reference count in dw_spi_dma_init_mfld() (git-fixes).\n- spi: dw: Fix PM disable depth imbalance in dw_spi_bt1_probe (git-fixes).\n- spi: meson-spicc: add local pow2 clock ops to preserve rate between messages (git-fixes).\n- spi: meson-spicc: do not rely on busy flag in pow2 clk ops (git-fixes).\n- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).\n- spi: propagate error code to the caller of acpi_spi_device_alloc() (bsc#1203699).\n- spi: pxa2xx: Add support for Intel Meteor Lake-P (jsc#PED-732).\n- spi: pxa2xx: Add support for Intel Raptor Lake PCH-S (jsc#PED-634).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_pm_resume_runtime() (git-fixes).\n- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume() (git-fixes).\n- spi: s3c64xx: Fix large transfers with DMA (git-fixes).\n- spi: spi-altera-dfl: Fix an error handling path (git-fixes).\n- spi: spi-imx: Fix spi_bus_clk if requested clock is higher than input clock (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: stm32: Print summary 'callbacks suppressed' message (git-fixes).\n- spi: stm32: fix stm32_spi_prepare_mbr() that halves spi clk for every run (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spi: tegra20-slink: fix UAF in tegra_slink_remove() (git-fixes).\n- spi: tegra210-quad: Fix duplicate resource error (git-fixes).\n- spmi: pmic-arb: correct duplicate APID to PPID mapping logic (git-fixes).\n- spmi: pmic-arb: do not ack and clear peripheral interrupts in cleanup_irq (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() (git-fixes).\n- staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw() (git-fixes).\n- staging: vt6655: fix potential memory leak (git-fixes).\n- staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).\n- stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove() (git-fixes).\n- stmmac: intel: Fix an error handling path in intel_eth_pci_probe() (git-fixes).\n- struct ehci_hcd: hide new element going into a hole (git-fixes).\n- struct xhci_hcd: restore member now dynamically allocated (git-fixes).\n- sunrpc: fix expiry of auth creds (git-fixes).\n- supported.conf: Add cs_dsp firmware module (bsc#1203699)\n- supported.conf: Add drivers/virt/coco/sevguest/sevguest\n- supported.conf: added drivers/net/ethernet/marvell/octeontx2/nic/otx2_ptp and \t\tchanged all octeontx2 modules as supported (jsc#SLE-24682)\n- supported.conf: mark drivers/nvme/common as supported (jsc#SLE-20183)\n- supported.conf: mark lib/objagg supported as dependency of mlxsw\n- supported.conf: mark mlxsw modules supported (jsc#SLE-23766)\n- supported.conf: mark spi-pxa2xx-platform as supported (bsc#1203699) It's required for the sound on recent Intel machines\n- tee: optee: do not check memref size on return from Secure World (git-fixes).\n- tee: tee_get_drvdata(): fix description of return value (git-fixes).\n- testing/selftests/mqueue: Fix mq_perf_tests to free the allocated cpu set (git-fixes).\n- testing: nvdimm: asm/mce.h is not needed in nfit.c (git-fixes).\n- testing: nvdimm: iomap: make __nfit_test_ioremap a macro (git-fixes).\n- tests: fix idmapped mount_setattr test (git-fixes).\n- thermal/drivers/qcom/tsens-v0_1: Fix MSM8939 fourth sensor hw_id (git-fixes).\n- thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (bsc#1201308).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thermal: cpufreq_cooling: Check the policy first in cpufreq_cooling_register() (git-fixes).\n- thermal: int340x: Mode setting with new OS handshake (jsc#PED-678).\n- thermal: int340x: Update OS policy capability handshake (jsc#PED-678).\n- thermal: intel_powerclamp: Use first online CPU as control_cpu (git-fixes).\n- thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thunderbolt: Add DP OUT resource when DP tunnel is discovered (git-fixes).\n- thunderbolt: Add back Intel Falcon Ridge end-to-end flow control workaround (git-fixes).\n- thunderbolt: Add missing device ID to tb_switch_is_alpine_ridge() (git-fixes).\n- thunderbolt: Add support for Intel Maple Ridge single port controller (git-fixes).\n- thunderbolt: Add support for Intel Raptor Lake (jsc#PED-634).\n- thunderbolt: Disable LTTPR on Intel Titan Ridge (git-fixes).\n- thunderbolt: Explicitly enable lane adapter hotplug events at startup (git-fixes).\n- thunderbolt: Explicitly reset plug events delay back to USB4 spec value (git-fixes).\n- thunderbolt: Fix buffer allocation of devices with no DisplayPort adapters (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- timers: implement usleep_idle_range() (git-fixes).\n- tools include UAPI: Sync sound/asound.h copy with the kernel sources (git-fixes).\n- tools/nolibc: fix incorrect truncation of exit code (git-fixes).\n- tools/nolibc: i386: fix initial stack alignment (git-fixes).\n- tools/nolibc: x86-64: Fix startup code bug (git-fixes).\n- tools/testing/scatterlist: add missing defines (git-fixes).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tools: hv: Remove an extraneous 'the' (git-fixes).\n- tools: hv: kvp: remove unnecessary (void*) conversions (git-fixes).\n- tools: iio: iio_generic_buffer: Fix read size (git-fixes).\n- tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH (git-fixes).\n- trace/osnoise: Add migrate-disabled field to the osnoise header (git-fixes).\n- trace/timerlat: Add migrate-disabled field to the timerlat header (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/kprobes: Check whether get_kretprobe() returns NULL in kretprobe_dispatcher() (git-fixes).\n- tracing/osnoise: Fix duration type (git-fixes).\n- tracing/osnoise: Fix possible recursive locking in stop_per_cpu_kthreads (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tracing/ring-buffer: Have polling block on watermark (git-fixes).\n- tracing: Add '(fault)' name injection to kernel probes (git-fixes).\n- tracing: Add ioctl() to force ring buffer waiters to wake up (git-fixes).\n- tracing: Add tracing_reset_all_online_cpus_unlocked() function (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: Disable interrupt or preemption before acquiring arch_spinlock_t (git-fixes).\n- tracing: Do not free snapshot if tracer is on cmdline (git-fixes).\n- tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() (git-fixes).\n- tracing: Fix memory leak in tracing_read_pipe() (git-fixes).\n- tracing: Fix reading strings from synthetic events (git-fixes).\n- tracing: Fix sleeping while atomic in kdb ftdump (git-fixes).\n- tracing: Fix wild-memory-access in register_synth_event() (git-fixes).\n- tracing: Free buffers when a used dynamic event is removed (git-fixes).\n- tracing: Have filter accept 'common_cpu' to be consistent (git-fixes).\n- tracing: Move duplicate code of trace_kprobe/eprobe.c into header (git-fixes).\n- tracing: Replace deprecated CPU-hotplug functions (git-fixes).\n- tracing: Simplify conditional compilation code in tracing_set_tracer() (git-fixes).\n- tracing: Use a struct alignof to determine trace event field alignment (git-fixes).\n- tracing: Wake up ring buffer waiters on closing of the file (git-fixes).\n- tracing: Wake up waiters when tracing is disabled (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tracing: kprobe: Fix kprobe event gen test module on exit (git-fixes).\n- tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit() (git-fixes).\n- tracing: kprobe: Make gen test module work in arm and riscv (git-fixes).\n- tty: 8250: Add support for Brainboxes PX cards (git-fixes).\n- tty: n_gsm: Delete gsm_disconnect when config requester (git-fixes).\n- tty: n_gsm: Delete gsmtty open SABM frame when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit printk info when config requester (git-fixes).\n- tty: n_gsm: Modify CR,PF bit when config requester (git-fixes).\n- tty: n_gsm: Modify cr bit value when config requester (git-fixes).\n- tty: n_gsm: Modify gsmtty driver register method when config requester (git-fixes).\n- tty: n_gsm: Save dlci address open status when config requester (git-fixes).\n- tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() (git-fixes).\n- tty: n_gsm: avoid call of sleeping functions from atomic context (git-fixes).\n- tty: n_gsm: clean up dead code in gsm_queue() (git-fixes).\n- tty: n_gsm: clean up implicit CR bit encoding in address field (git-fixes).\n- tty: n_gsm: clean up indenting in gsm_queue() (git-fixes).\n- tty: n_gsm: fix DM command (git-fixes).\n- tty: n_gsm: fix broken virtual tty handling (git-fixes).\n- tty: n_gsm: fix buffer over-read in gsm_dlci_data() (git-fixes).\n- tty: n_gsm: fix deadlock and link starvation in outgoing data path (git-fixes).\n- tty: n_gsm: fix decoupled mux resource (git-fixes).\n- tty: n_gsm: fix encoding of command/response bit (git-fixes).\n- tty: n_gsm: fix flow control handling in tx path (git-fixes).\n- tty: n_gsm: fix frame reception handling (git-fixes).\n- tty: n_gsm: fix incorrect UA handling (git-fixes).\n- tty: n_gsm: fix insufficient txframe size (git-fixes).\n- tty: n_gsm: fix invalid gsmtty_write_room() result (git-fixes).\n- tty: n_gsm: fix invalid use of MSC in advanced option (git-fixes).\n- tty: n_gsm: fix malformed counter for out of frame data (git-fixes).\n- tty: n_gsm: fix missing corner cases in gsmld_poll() (git-fixes).\n- tty: n_gsm: fix missing explicit ldisc flush (git-fixes).\n- tty: n_gsm: fix missing mux reset on config change at responder (git-fixes).\n- tty: n_gsm: fix missing timer to handle stalled links (git-fixes).\n- tty: n_gsm: fix missing tty wakeup in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix missing update of modem controls after DLCI open (git-fixes).\n- tty: n_gsm: fix mux activation issues in gsm_config() (git-fixes).\n- tty: n_gsm: fix mux cleanup after unregister tty device (git-fixes).\n- tty: n_gsm: fix non flow control frames during mux flow off (git-fixes).\n- tty: n_gsm: fix packet re-transmission without open control channel (git-fixes).\n- tty: n_gsm: fix race condition in gsmld_write() (git-fixes).\n- tty: n_gsm: fix reset fifo race condition (git-fixes).\n- tty: n_gsm: fix resource allocation order in gsm_activate_mux() (git-fixes).\n- tty: n_gsm: fix restart handling via CLD command (git-fixes).\n- tty: n_gsm: fix sleep-in-atomic-context bug in gsm_control_send (git-fixes).\n- tty: n_gsm: fix software flow control handling (git-fixes).\n- tty: n_gsm: fix sometimes uninitialized warning in gsm_dlci_modem_output() (git-fixes).\n- tty: n_gsm: fix tty registration before control channel open (git-fixes).\n- tty: n_gsm: fix user open not possible at responder until initiator open (git-fixes).\n- tty: n_gsm: fix wrong DLCI release order (git-fixes).\n- tty: n_gsm: fix wrong T1 retry count handling (git-fixes).\n- tty: n_gsm: fix wrong command frame length field encoding (git-fixes).\n- tty: n_gsm: fix wrong command retry handling (git-fixes).\n- tty: n_gsm: fix wrong queuing behavior in gsm_dlci_data_output() (git-fixes).\n- tty: n_gsm: fix wrong signal octet encoding in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong signal octets encoding in MSC (git-fixes).\n- tty: n_gsm: initialize more members at gsm_alloc_mux() (git-fixes).\n- tty: n_gsm: replace kicktimer with delayed_work (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: atmel: Preserve previous USART mode if RS485 disabled (git-fixes).\n- tty: serial: fsl_lpuart: correct the count of break characters (git-fixes).\n- tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (git-fixes).\n- tty: serial: fsl_lpuart: do not break the on-going transfer when global reset (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- tty: xilinx_uartps: Fix the ignore_status (git-fixes).\n- tun: avoid double free in tun_free_netdev (git-fixes).\n- tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (git-fixes).\n- tuntap: add sanity checks about msg_controllen in sendmsg (git-fixes).\n- uaccess: fix type mismatch warnings from access_ok() (git-fixes).\n- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).\n- uas: ignore UAS for Thinkplus chips (git-fixes).\n- ucounts: Base set_cred_ucounts changes on the real user (git-fixes).\n- ucounts: Fix rlimit max values check (git-fixes).\n- ucounts: Fix systemd LimitNPROC with private users regression (git-fixes).\n- ucounts: Handle wrapping in is_ucounts_overlimit (git-fixes).\n- ucounts: In set_cred_ucounts assume new->ucounts is non-NULL (git-fixes).\n- udf: Fix crash after seekdir (bsc#1194592).\n- udmabuf: Set the DMA mask for the udmabuf device (v2) (git-fixes).\n- udmabuf: Set ubuf->sg = NULL if the creation of sg table fails (git-fixes).\n- udmabuf: add back sanity check (git-fixes).\n- units: Add SI metric prefix definitions (git-fixes).\n- units: add the HZ macros (git-fixes).\n- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).\n- usb-storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- usb.h: struct usb_device: hide new member (git-fixes).\n- usb/hcd: Fix dma_map_sg error check (git-fixes).\n- usb: Drop commas after SoC match table sentinels (git-fixes).\n- usb: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).\n- usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc() (git-fixes).\n- usb: bdc: change state when port disconnected (git-fixes).\n- usb: cdc-wdm: Use skb_put_data() instead of skb_put/memcpy pair (git-fixes).\n- usb: cdns3 fix use-after-free at workaround 2 (git-fixes).\n- usb: cdns3: Do not use priv_dev uninitialized in cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable() (git-fixes).\n- usb: cdns3: fix incorrect handling TRB_SMM flag for ISOC transfer (git-fixes).\n- usb: cdns3: fix issue with rearming ISO OUT endpoint (git-fixes).\n- usb: cdns3: fix random warning message when driver load (git-fixes).\n- usb: cdns3: host: fix endless superspeed hub port reset (git-fixes).\n- usb: cdnsp: Fix issue with Clear Feature Halt Endpoint (git-fixes).\n- usb: cdnsp: fix issue with ZLP - added TD_SIZE = 1 (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: common: debug: Check non-standard control requests (git-fixes).\n- usb: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- usb: dwc2: gadget: remove D+ pull-up while no vbus with usb-role-switch (git-fixes).\n- usb: dwc3: core: Deprecate GCTL.CORESOFTRESET (git-fixes).\n- usb: dwc3: core: Do not perform GCTL_CORE_SOFTRESET during bootup (git-fixes).\n- usb: dwc3: core: Enable GUCTL1 bit 10 for fixing termination error after resume bug (git-fixes).\n- usb: dwc3: core: leave default DMA if the controller does not support 64-bit DMA (git-fixes).\n- usb: dwc3: disable USB core PHY management (git-fixes).\n- usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core (git-fixes).\n- usb: dwc3: dwc3-qcom: Fix typo in the dwc3 vbus override API (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: gadget: Avoid duplicate requests to enable Run/Stop (git-fixes).\n- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind (git-fixes).\n- usb: dwc3: gadget: Clear ep descriptor last (git-fixes).\n- usb: dwc3: gadget: Do not modify GEVNTCOUNT in pullup() (git-fixes).\n- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).\n- usb: dwc3: gadget: Refactor pullup() (git-fixes).\n- usb: dwc3: gadget: Return -ESHUTDOWN on ep disable (git-fixes).\n- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).\n- usb: dwc3: gadget: conditionally remove requests (git-fixes).\n- usb: dwc3: gadget: fix high speed multiplier setting (git-fixes).\n- usb: dwc3: gadget: refactor dwc3_repare_one_trb (git-fixes).\n- usb: dwc3: pci: Add support for Intel Raptor Lake (git-fixes).\n- usb: dwc3: qcom: Add helper functions to enable,disable wake irqs (git-fixes).\n- usb: dwc3: qcom: fix missing optional irq warnings (git-fixes).\n- usb: dwc3: qcom: fix use-after-free on runtime-PM wakeup (git-fixes).\n- usb: ehci: Fix a function name in comments (git-fixes).\n- usb: gadget: bdc: fix typo in comment (git-fixes).\n- usb: gadget: f_fs: stricter integer overflow checks (git-fixes).\n- usb: gadget: f_uac2: clean up some inconsistent indenting (git-fixes).\n- usb: gadget: f_uac2: fix superspeed transfer (git-fixes).\n- usb: gadget: function: fix dangling pnp_string in f_printer.c (git-fixes).\n- usb: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init() (git-fixes).\n- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- usb: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- usb: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- usb: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- usb: host: xhci-plat: suspend and resume clocks (git-fixes).\n- usb: host: xhci-plat: suspend/resume clks for brcm (git-fixes).\n- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() (git-fixes).\n- usb: host: xhci: fix a comment typo in xhci_mem_init() (git-fixes).\n- usb: host: xhci: use ffs() in xhci_mem_init() (git-fixes).\n- usb: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- usb: hub: avoid warm port reset during USB3 disconnect (git-fixes).\n- usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).\n- usb: mon: make mmapped memory read only (git-fixes).\n- usb: mtu3: fix failed runtime suspend in host only mode (git-fixes).\n- usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).\n- usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- usb: renesas: Fix refcount leak bug (git-fixes).\n- usb: smsc: use eth_hw_addr_set() (git-fixes).\n- usb: storage: Add ASUS <0x0b05:0x1932> to IGNORE_UAS (git-fixes).\n- usb: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- usb: typec: intel_pmc_mux: Add new ACPI ID for Meteor Lake IOM device (git-fixes).\n- usb: typec: mux: Enter safe mode only when pins need to be reconfigured (git-fixes).\n- usb: typec: tcpm: Return ENOTSUPP for power supply prop writes (git-fixes).\n- usb: typec: tcpm: fix typo in comment (git-fixes).\n- usb: typec: tipd: Add an additional overflow check (git-fixes).\n- usb: typec: tipd: Do not read/write more bytes than required (git-fixes).\n- usb: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- usb: typec: ucsi: Remove incorrect warning (git-fixes).\n- usb: xhci-mtk: check boundary before check tt (git-fixes).\n- usb: xhci-mtk: relax TT periodic bandwidth allocation (git-fixes).\n- usb: xhci-mtk: update fs bus bandwidth by bw_budget_table (git-fixes).\n- usb: xhci: add XHCI_SPURIOUS_SUCCESS to ASM1042 despite being a V0.96 controller (git-fixes).\n- usb: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: Run unregister_netdev() before unbind() again (git-fixes).\n- usbnet: smsc95xx: Avoid link settings race on interrupt reception (git-fixes).\n- usbnet: smsc95xx: Do not clear read-only PHY interrupt (git-fixes).\n- usbnet: smsc95xx: Do not reset PHY behind PHY driver's back (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- usbnet: smsc95xx: Forward PHY interrupts to PHY driver to avoid polling (git-fixes).\n- userfaultfd/selftests: fix hugetlb area allocations (git-fixes).\n- v3 of 'PCI: hv: Only reuse existing IRTE allocation for Multi-MSI'\n- vboxguest: Do not use devm for irq (git-fixes).\n- vdpa_sim: avoid putting an uninitialized iova_domain (git-fixes).\n- venus: pm_helpers: Fix warning in OPP during probe (git-fixes).\n- vfio/ccw: Do not change FSM state in subchannel event (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- vfio/type1: Unpin zero pages (git-fixes).\n- vfio: Clear the caps->buf to NULL after free (git-fixes).\n- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).\n- video/fbdev/stifb: Implement the stifb_fillrect() function (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: i740fb: Error out if 'pixclock' equals zero (git-fixes).\n- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virt: Add SEV-SNP guest driver (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to derive key (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Add support to get extended report (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix bool function returning negative value (jsc#SLE-19924, jsc#SLE-24814).\n- virt: sevguest: Fix return value check in alloc_shared_pages() (jsc#SLE-19924, jsc#SLE-24814).\n- virt: vbox: convert to use dev_groups (git-fixes).\n- virtio-blk: Use blk_validate_block_size() to validate block size (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: correctly report encapsulated LRO packet (git-fixes).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use correct intrConf reference when using extended queues (git-fixes).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vrf: do not run conntrack on vrf with !dflt qdisc (git-fixes).\n- vrf: fix packet sniffing for traffic originating from ip tunnels (git-fixes).\n- vsock/virtio: enable VQs early on probe (git-fixes).\n- vsock/virtio: initialize vdev->priv before using VQs (git-fixes).\n- vsock/virtio: read the negotiated features before using VQs (git-fixes).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vsock: fix possible infinite sleep in vsock_connectible_wait_data() (git-fixes).\n- vsock: remove the unused 'wait' in vsock_connectible_recvmsg() (git-fixes).\n- vsock: remove vsock from connected table when connect is interrupted by a signal (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- watch-queue: remove spurious double semicolon (git-fixes).\n- watch_queue: Fix missing locking in add_watch_to_object() (git-fixes).\n- watch_queue: Fix missing rcu annotation (git-fixes).\n- watchdog-export-lockup_detector_reconfigure.patch.\n- watchdog/hpwdt: Include nmi.h only if CONFIG_HPWDT_NMI_DECODING (git-fixes).\n- watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure (git-fixes).\n- watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- watchqueue: make sure to serialize 'wqueue->defunct' properly (git-fixes).\n- wifi: airo: do not assign -1 to unsigned char (git-fixes).\n- wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() (git-fixes).\n- wifi: ath11k: Fix QCN9074 firmware boot on x86 (git-fixes).\n- wifi: ath11k: avoid deadlock during regulatory update in ath11k_regd_update() (git-fixes).\n- wifi: ath11k: fix number of VHT beamformee spatial streams (git-fixes).\n- wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).\n- wifi: brcmfmac: fix invalid address access when enabling SCAN log level (git-fixes).\n- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (git-fixes).\n- wifi: cfg80211/mac80211: reject bad MBSSID elements (git-fixes).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: cfg80211: do not allow multi-BSSID in S1G (git-fixes).\n- wifi: cfg80211: fix buffer overflow in elem comparison (git-fixes).\n- wifi: cfg80211: fix ieee80211_data_to_8023_exthdr handling of small packets (git-fixes).\n- wifi: cfg80211: fix memory leak in query_regdb_file() (git-fixes).\n- wifi: cfg80211: silence a sparse RCU warning (git-fixes).\n- wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (other cases) (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).\n- wifi: mac80211: Fix ack frame idr leak when mesh has no route (git-fixes).\n- wifi: mac80211: allow bw change during channel switch in mesh (git-fixes).\n- wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on fast-rx (git-fixes).\n- wifi: mac80211: fix decap offload for stations on AP_VLAN interfaces (git-fixes).\n- wifi: mac80211: fix memory free error when registering wiphy fail (git-fixes).\n- wifi: mac80211: fix probe req HE capabilities access (git-fixes).\n- wifi: mac80211: fix regression with non-QoS drivers (git-fixes).\n- wifi: mac80211: limit A-MSDU subframes for client too (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).\n- wifi: mac80211_hwsim: check length for virtio packets (git-fixes).\n- wifi: mac80211_hwsim: fix debugfs attribute ps with rc table support (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration (git-fixes).\n- wifi: mt76: fix reading current per-tid starting sequence number for aggregation (git-fixes).\n- wifi: mt76: mt7615: add mt7615_mutex_acquire/release in mt7615_sta_set_decap_offload (git-fixes).\n- wifi: mt76: mt7915: do not check state before configuring implicit beamform (git-fixes).\n- wifi: mt76: mt7921: reset msta->airtime_ac while clearing up hw value (git-fixes).\n- wifi: mt76: sdio: fix transmitting packet hangs (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).\n- wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).\n- wifi: rt2x00: set SoC wmac clock register (git-fixes).\n- wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).\n- wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).\n- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).\n- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).\n- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).\n- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask (git-fixes).\n- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).\n- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse() (git-fixes).\n- wifi: rtlwifi: 8192de: correct checking of IQK reload (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: rtlwifi: remove always-true condition pointed out by GCC 12 (git-fies).\n- wifi: rtw88: add missing destroy_workqueue() on error path in rtw_core_init() (git-fixes).\n- wifi: rtw88: check the return value of alloc_workqueue() (git-fixes).\n- wifi: rtw89: 8852a: rfk: fix div 0 exception (git-fixes).\n- wifi: wext: use flex array destination for memcpy() (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute (git-fixes).\n- wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute (git-fixes).\n- wifi: wilc1000: validate number of channels (git-fixes).\n- wifi: wilc1000: validate pairwise and authentication suite offsets (git-fixes).\n- wireguard: device: check for metadata_dst with skb_valid_dst() (git-fixes).\n- wireless: Remove redundant 'flush_workqueue()' calls (bsc#1202131).\n- workqueue: do not skip lockdep work dependency in cancel_work_sync() (git-fixes).\n- wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new() (git-fixes).\n- x86/Hyper-V: Add SEV negotiate protocol support in Isolation VM (bsc#1190497).\n- x86/Xen: streamline (and fix) PV CPU enumeration (git-fixes).\n- x86/boot: Add Confidential Computing type to setup_data (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Add a pointer to Confidential Computing blob in bootparams (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Do not propagate uninitialized boot_params->cc_blob_address (bsc#1204970).\n- x86/boot: Fix the setup data types max limit (bsc#1204970).\n- x86/boot: Introduce helpers for MSR reads/writes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Put globals that are accessed early into the .data section (jsc#SLE-19924, jsc#SLE-24814).\n- x86/boot: Use MSR read/write helpers instead of inline assembly (jsc#SLE-19924, jsc#SLE-24814).\n- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 (bsc#1206037).\n- x86/compressed/64: Add identity mapping for Confidential Computing blob (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Add identity mappings for setup_data entries (bsc#1204970).\n- x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/64: Detect/setup SEV/SME features earlier during boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI config table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI detection to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI kexec handling into common code (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI system table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed/acpi: Move EFI vendor table lookup to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Add helper for validating pages in the decompression stage (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Export and rename add_identity_map() (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/cpu: Restore AMD's DE_CFG MSR after resume (bsc#1205473).\n- x86/entry: Work around Clang __bdos() bug (git-fixes).\n- x86/extable: Extend extable functionality (git-fixes).\n- x86/fpu: Drop fpregs lock before inheriting FPU permissions (bnc#1205282).\n- x86/futex: Remove .fixup usage (git-fixes).\n- x86/head/64: Re-enable stack protection (jsc#SLE-19924, jsc#SLE-24814).\n- x86/hyperv: Disable hardlockup detector by default in Hyper-V guests (git-fixes).\n- x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition (git-fixes).\n- x86/hyperv: Update 'struct hv_enlightened_vmcs' definition (git-fixes).\n- x86/hyperv: fix invalid writes to MSRs during root partition kexec (git-fixes).\n- x86/ibt,ftrace: Make function-graph play nice (bsc#1203969).\n- x86/kernel: Mark the .bss..decrypted section as shared in the RMP table (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kernel: Validate ROM memory before accessing when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/kexec: Fix double-free of elf header buffer (bsc#1205567).\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/microcode/AMD: Apply the patch early on every logical thread (bsc#1205264).\n- x86/mm: Extend cc_attr to include AMD SEV-SNP (jsc#SLE-19924, jsc#SLE-24814).\n- x86/mm: Validate memory when changing the C-bit (jsc#SLE-19924, jsc#SLE-24814).\n- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).\n- x86/retbleed: Add fine grained Kconfig knobs (bsc#1190497).\n- x86/sev: Add SEV-SNP feature detection/setup (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a helper for the PVALIDATE instruction (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add a sev= cmdline option (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add helper for validating pages in early enc attribute changes (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Add missing __init annotations to SEV init routines (jsc#SLE-19924 jsc#SLE-24814).\n- x86/sev: Annotate stack change in the #VC handler (bsc#1204970).\n- x86/sev: Check SEV-SNP features support (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Check the VMPL level (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Define the Linux-specific guest termination reasons (bsc#1190497).\n- x86/sev: Detect/setup SEV/SME features earlier in boot (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Do not use cc_platform_has() for early SEV-SNP calls (bsc#1204970).\n- x86/sev: Get the AP jump table address from secrets page (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Move MSR-based VMGEXITs for CPUID to helper (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Provide support for SNP guest request NAEs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register GHCB memory when SEV-SNP is active (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Register SEV-SNP guest request platform device (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Remove duplicated assignment to variable info (bsc#1204970).\n- x86/sev: Save the negotiated GHCB version (bsc#1190497).\n- x86/sev: Use SEV-SNP AP creation to start secondary CPUs (jsc#SLE-19924, jsc#SLE-24814).\n- x86/sev: Use firmware-validated CPUID for SEV-SNP guests (jsc#SLE-19924, jsc#SLE-24814).\n- x86/uaccess: Implement macros for CMPXCHG on user addresses (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen-blkback: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkback: Apply 'feature_persistent' parameter when connect (git-fixes).\n- xen-blkback: fix persistent grants negotiation (git-fixes).\n- xen-blkfront: Advertise feature-persistent as user requested (git-fixes).\n- xen-blkfront: Apply 'feature_persistent' parameter when connect (git-fixes).\n- xen-blkfront: Cache feature_persistent value before advertisement (git-fixes).\n- xen-blkfront: Handle NULL gendisk (git-fixes).\n- xen-netback: only remove 'hotplug-status' when the vif is actually destroyed (git-fixes).\n- xen/gntdev: Accommodate VMA splitting (git-fixes).\n- xen/gntdev: Avoid blocking in unmap_grant_pages() (git-fixes).\n- xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE (git-fixes).\n- xen/gntdev: Prevent leaking grants (git-fixes).\n- xen/gntdev: fix unmap notification order (git-fixes).\n- xen/grants: prevent integer overflow in gnttab_dma_alloc_pages() (git-fixes).\n- xen/pcpu: fix possible memory leak in register_pcpu() (git-fixes).\n- xen/privcmd: fix error exit of privcmd_ioctl_dm_op() (git-fixes).\n- xen/usb: do not use arbitrary_virt_to_machine() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xfs: Fix the free logic of state in xfs_attr_node_hasname (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (git-fixes).\n- xfs: convert XLOG_FORCED_SHUTDOWN() to xlog_is_shutdown() (git-fixes).\n- xfs: fix perag reference leak on iteration race with growfs (git-fixes).\n- xfs: fix soft lockup via spinning in filestream ag selection loop (git-fixes).\n- xfs: fix use-after-free in xattr node block inactivation (git-fixes).\n- xfs: fix xfs_ifree() error handling to not leak perag ref (git-fixes).\n- xfs: fold perag loop iteration logic into helper function (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: only bother with sync_filesystem during readonly remount (git-fixes).\n- xfs: prevent UAF in xfs_log_item_in_current_chkpt (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: remove incorrect ASSERT in xfs_rename (git-fixes).\n- xfs: rename the next_agno perag iteration variable (git-fixes).\n- xfs: reorder iunlink remove operation in xfs_ifree (git-fixes).\n- xfs: reserve quota for dir expansion when linking/unlinking files (bsc#1205616).\n- xfs: reserve quota for target dir expansion when renaming files (bsc#1205679).\n- xfs: revert 'xfs: actually bump warning counts when we send warnings' (git-fixes).\n- xfs: terminate perag iteration reliably on agcount (git-fixes).\n- xfs: use invalidate_lock to check the state of mmap_lock (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xfs: use setattr_copy to set vfs inode attributes (git-fixes).\n- xhci-pci: Set runtime PM as default policy on all xHC 1.2 or later devices (git-fixes).\n- xhci: Add quirk to reset host back to default state at shutdown (git-fixes).\n- xhci: Allocate separate command structures for each LPM command (git-fixes).\n- xhci: Do not show warning for reinit on known broken suspend (git-fixes).\n- xhci: Remove device endpoints from bandwidth list when freeing the device (git-fixes).\n- xhci: Set HCD flag to defer primary roothub registration (git-fixes).\n- xhci: dbc: Fix memory leak in xhci_alloc_dbc() (git-fixes).\n- xhci: dbc: Rename xhci_dbc_init and xhci_dbc_exit (git-fixes).\n- xhci: dbc: create and remove dbc structure in dbgtty driver (git-fixes).\n- xhci: dbc: refactor xhci_dbc_init() (git-fixes).\n- xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (git-fixes).\n- xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).\n- zonefs: Clear inode information flags on inode creation (git-fixes).\n- zonefs: Fix management of open zones (git-fixes).\n- zonefs: add MODULE_ALIAS_FS (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-4617,SUSE-SLE-Micro-5.3-2022-4617,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4617,SUSE-SLE-Module-RT-15-SP4-2022-4617,openSUSE-Leap-Micro-5.3-2022-4617,openSUSE-SLE-15.4-2022-4617", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4617-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:4617-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20224617-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:4617-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html", }, { category: "self", summary: "SUSE Bug 1023051", url: "https://bugzilla.suse.com/1023051", }, { category: "self", summary: "SUSE Bug 1032323", url: "https://bugzilla.suse.com/1032323", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1164051", url: "https://bugzilla.suse.com/1164051", }, { category: "self", summary: "SUSE Bug 1177471", url: "https://bugzilla.suse.com/1177471", }, { category: "self", summary: "SUSE Bug 1184350", url: "https://bugzilla.suse.com/1184350", }, { category: "self", summary: "SUSE Bug 1185032", url: "https://bugzilla.suse.com/1185032", }, { category: "self", summary: "SUSE Bug 1188238", url: "https://bugzilla.suse.com/1188238", }, { category: "self", summary: "SUSE Bug 1189297", url: "https://bugzilla.suse.com/1189297", }, { category: "self", summary: "SUSE Bug 1189999", url: "https://bugzilla.suse.com/1189999", }, { category: "self", summary: "SUSE Bug 1190256", url: "https://bugzilla.suse.com/1190256", }, { category: "self", summary: "SUSE Bug 1190497", url: "https://bugzilla.suse.com/1190497", }, { category: "self", summary: "SUSE Bug 1190969", url: "https://bugzilla.suse.com/1190969", }, { category: "self", summary: "SUSE Bug 1192968", url: "https://bugzilla.suse.com/1192968", }, { category: "self", summary: "SUSE Bug 1193629", url: "https://bugzilla.suse.com/1193629", }, { category: "self", summary: "SUSE Bug 1194023", url: "https://bugzilla.suse.com/1194023", }, { category: "self", summary: "SUSE Bug 1194592", url: "https://bugzilla.suse.com/1194592", }, { category: "self", summary: "SUSE Bug 1194869", url: "https://bugzilla.suse.com/1194869", }, { category: "self", summary: "SUSE Bug 1194904", url: "https://bugzilla.suse.com/1194904", }, { category: "self", summary: "SUSE Bug 1195480", url: "https://bugzilla.suse.com/1195480", }, { category: "self", summary: "SUSE Bug 1195917", url: "https://bugzilla.suse.com/1195917", }, { category: "self", summary: "SUSE Bug 1196018", url: "https://bugzilla.suse.com/1196018", }, { category: "self", summary: "SUSE Bug 1196444", url: "https://bugzilla.suse.com/1196444", }, { category: "self", summary: "SUSE Bug 1196616", url: "https://bugzilla.suse.com/1196616", }, { category: "self", summary: "SUSE Bug 1196632", url: "https://bugzilla.suse.com/1196632", }, { category: "self", summary: "SUSE Bug 1196867", url: "https://bugzilla.suse.com/1196867", }, { category: "self", summary: "SUSE Bug 1196869", url: "https://bugzilla.suse.com/1196869", }, { category: "self", summary: "SUSE Bug 1197158", url: "https://bugzilla.suse.com/1197158", }, { category: "self", summary: "SUSE Bug 1197391", url: "https://bugzilla.suse.com/1197391", }, { category: "self", summary: "SUSE Bug 1197659", url: "https://bugzilla.suse.com/1197659", }, { category: "self", summary: "SUSE Bug 1197755", url: "https://bugzilla.suse.com/1197755", }, { category: "self", summary: "SUSE Bug 1197756", url: "https://bugzilla.suse.com/1197756", }, { category: "self", summary: "SUSE Bug 1197757", url: "https://bugzilla.suse.com/1197757", }, { category: "self", summary: "SUSE Bug 1197763", url: "https://bugzilla.suse.com/1197763", }, { category: "self", summary: "SUSE Bug 1198189", url: "https://bugzilla.suse.com/1198189", }, { category: "self", summary: "SUSE Bug 1198410", url: "https://bugzilla.suse.com/1198410", }, { category: "self", summary: "SUSE Bug 1198577", url: "https://bugzilla.suse.com/1198577", }, { category: "self", summary: "SUSE Bug 1198702", url: "https://bugzilla.suse.com/1198702", }, { category: "self", summary: "SUSE Bug 1198971", url: "https://bugzilla.suse.com/1198971", }, { category: "self", summary: "SUSE Bug 1199086", url: "https://bugzilla.suse.com/1199086", }, { category: "self", summary: "SUSE Bug 1199364", url: "https://bugzilla.suse.com/1199364", }, { category: "self", summary: "SUSE Bug 1199515", url: "https://bugzilla.suse.com/1199515", }, { category: "self", summary: "SUSE Bug 1199670", url: "https://bugzilla.suse.com/1199670", }, { category: "self", summary: "SUSE Bug 1199904", url: "https://bugzilla.suse.com/1199904", }, { category: "self", summary: "SUSE Bug 1200015", url: "https://bugzilla.suse.com/1200015", }, { category: "self", summary: "SUSE Bug 1200058", url: "https://bugzilla.suse.com/1200058", }, { category: "self", summary: "SUSE Bug 1200268", url: "https://bugzilla.suse.com/1200268", }, { category: "self", summary: "SUSE Bug 1200288", url: "https://bugzilla.suse.com/1200288", }, { category: "self", summary: "SUSE Bug 1200301", url: "https://bugzilla.suse.com/1200301", }, { category: "self", summary: "SUSE Bug 1200313", url: "https://bugzilla.suse.com/1200313", }, { category: "self", summary: "SUSE Bug 1200431", url: "https://bugzilla.suse.com/1200431", }, { category: "self", summary: "SUSE Bug 1200465", url: "https://bugzilla.suse.com/1200465", }, { category: "self", summary: "SUSE Bug 1200494", url: "https://bugzilla.suse.com/1200494", }, { category: "self", summary: "SUSE Bug 1200544", url: "https://bugzilla.suse.com/1200544", }, { category: "self", summary: "SUSE Bug 1200567", url: "https://bugzilla.suse.com/1200567", }, { category: "self", summary: "SUSE Bug 1200622", url: "https://bugzilla.suse.com/1200622", }, { category: "self", summary: "SUSE Bug 1200644", url: "https://bugzilla.suse.com/1200644", }, { category: "self", summary: "SUSE Bug 1200651", url: "https://bugzilla.suse.com/1200651", }, { category: "self", summary: "SUSE Bug 1200692", url: "https://bugzilla.suse.com/1200692", }, { category: "self", summary: "SUSE Bug 1200788", url: "https://bugzilla.suse.com/1200788", }, { category: "self", summary: "SUSE Bug 1200845", url: "https://bugzilla.suse.com/1200845", }, { category: "self", summary: "SUSE Bug 1200868", url: "https://bugzilla.suse.com/1200868", }, { category: "self", summary: "SUSE Bug 1200869", url: "https://bugzilla.suse.com/1200869", }, { category: "self", summary: "SUSE Bug 1200870", url: "https://bugzilla.suse.com/1200870", }, { category: "self", summary: "SUSE Bug 1200871", url: "https://bugzilla.suse.com/1200871", }, { category: "self", summary: "SUSE Bug 1200872", url: "https://bugzilla.suse.com/1200872", }, { category: "self", summary: "SUSE Bug 1200873", url: "https://bugzilla.suse.com/1200873", }, { category: "self", summary: "SUSE Bug 1201019", url: "https://bugzilla.suse.com/1201019", }, { category: "self", summary: "SUSE Bug 1201308", url: "https://bugzilla.suse.com/1201308", }, { category: "self", summary: "SUSE Bug 1201309", url: "https://bugzilla.suse.com/1201309", }, { category: "self", summary: "SUSE Bug 1201310", url: "https://bugzilla.suse.com/1201310", }, { category: "self", summary: "SUSE Bug 1201361", url: "https://bugzilla.suse.com/1201361", }, { category: "self", summary: "SUSE Bug 1201427", url: "https://bugzilla.suse.com/1201427", }, { category: "self", summary: "SUSE Bug 1201442", url: "https://bugzilla.suse.com/1201442", }, { category: "self", summary: "SUSE Bug 1201455", url: "https://bugzilla.suse.com/1201455", }, { category: "self", summary: "SUSE Bug 1201489", url: "https://bugzilla.suse.com/1201489", }, { category: "self", summary: "SUSE Bug 1201610", url: "https://bugzilla.suse.com/1201610", }, { category: "self", summary: "SUSE Bug 1201675", url: "https://bugzilla.suse.com/1201675", }, { category: "self", summary: "SUSE Bug 1201725", url: "https://bugzilla.suse.com/1201725", }, { category: "self", summary: "SUSE Bug 1201726", url: "https://bugzilla.suse.com/1201726", }, { category: "self", summary: "SUSE Bug 1201768", url: "https://bugzilla.suse.com/1201768", }, { category: "self", summary: "SUSE Bug 1201865", url: "https://bugzilla.suse.com/1201865", }, { category: "self", summary: "SUSE Bug 1201940", url: "https://bugzilla.suse.com/1201940", }, { category: "self", summary: "SUSE Bug 1201941", url: "https://bugzilla.suse.com/1201941", }, { category: "self", summary: "SUSE Bug 1201948", url: "https://bugzilla.suse.com/1201948", }, { category: "self", summary: "SUSE Bug 1201954", url: "https://bugzilla.suse.com/1201954", }, { category: "self", summary: "SUSE Bug 1201956", url: "https://bugzilla.suse.com/1201956", }, { category: "self", summary: "SUSE Bug 1201958", url: "https://bugzilla.suse.com/1201958", }, { category: "self", summary: "SUSE Bug 1202095", url: "https://bugzilla.suse.com/1202095", }, { category: "self", summary: "SUSE Bug 1202096", url: "https://bugzilla.suse.com/1202096", }, { category: "self", summary: "SUSE Bug 1202097", url: "https://bugzilla.suse.com/1202097", }, { category: "self", summary: "SUSE Bug 1202113", url: "https://bugzilla.suse.com/1202113", }, { category: "self", summary: "SUSE Bug 1202131", url: "https://bugzilla.suse.com/1202131", }, { category: "self", summary: "SUSE Bug 1202154", url: "https://bugzilla.suse.com/1202154", }, { category: "self", summary: "SUSE Bug 1202187", url: "https://bugzilla.suse.com/1202187", }, { category: "self", summary: "SUSE Bug 1202262", url: "https://bugzilla.suse.com/1202262", }, { category: "self", summary: "SUSE Bug 1202265", url: "https://bugzilla.suse.com/1202265", }, { category: "self", summary: "SUSE Bug 1202312", url: "https://bugzilla.suse.com/1202312", }, { category: "self", summary: "SUSE Bug 1202341", url: "https://bugzilla.suse.com/1202341", }, { category: "self", summary: "SUSE Bug 1202346", url: "https://bugzilla.suse.com/1202346", }, { category: "self", summary: "SUSE Bug 1202347", url: "https://bugzilla.suse.com/1202347", }, { category: "self", summary: "SUSE Bug 1202385", url: "https://bugzilla.suse.com/1202385", }, { category: "self", summary: "SUSE Bug 1202393", url: "https://bugzilla.suse.com/1202393", }, { category: "self", summary: "SUSE Bug 1202447", url: "https://bugzilla.suse.com/1202447", }, { category: "self", summary: "SUSE Bug 1202471", url: "https://bugzilla.suse.com/1202471", }, { category: "self", summary: "SUSE Bug 1202558", url: "https://bugzilla.suse.com/1202558", }, { category: "self", summary: "SUSE Bug 1202623", url: "https://bugzilla.suse.com/1202623", }, { category: "self", summary: "SUSE Bug 1202636", url: "https://bugzilla.suse.com/1202636", }, { category: "self", summary: "SUSE Bug 1202672", url: "https://bugzilla.suse.com/1202672", }, { category: "self", summary: "SUSE Bug 1202681", url: "https://bugzilla.suse.com/1202681", }, { category: "self", summary: "SUSE Bug 1202685", url: "https://bugzilla.suse.com/1202685", }, { category: "self", summary: "SUSE Bug 1202686", url: "https://bugzilla.suse.com/1202686", }, { category: "self", summary: "SUSE Bug 1202700", url: "https://bugzilla.suse.com/1202700", }, { category: "self", summary: "SUSE Bug 1202710", url: "https://bugzilla.suse.com/1202710", }, { category: "self", summary: "SUSE Bug 1202711", url: "https://bugzilla.suse.com/1202711", }, { category: "self", summary: "SUSE Bug 1202712", url: "https://bugzilla.suse.com/1202712", }, { category: "self", summary: "SUSE Bug 1202713", url: "https://bugzilla.suse.com/1202713", }, { category: "self", summary: "SUSE Bug 1202715", url: "https://bugzilla.suse.com/1202715", }, { category: "self", summary: "SUSE Bug 1202716", url: "https://bugzilla.suse.com/1202716", }, { category: "self", summary: "SUSE Bug 1202757", url: "https://bugzilla.suse.com/1202757", }, { category: "self", summary: "SUSE Bug 1202758", url: "https://bugzilla.suse.com/1202758", }, { category: "self", summary: "SUSE Bug 1202759", url: "https://bugzilla.suse.com/1202759", }, { category: "self", summary: "SUSE Bug 1202761", url: "https://bugzilla.suse.com/1202761", }, { category: "self", summary: "SUSE Bug 1202762", url: "https://bugzilla.suse.com/1202762", }, { category: "self", summary: "SUSE Bug 1202763", url: "https://bugzilla.suse.com/1202763", }, { category: "self", summary: "SUSE Bug 1202764", url: "https://bugzilla.suse.com/1202764", }, { category: "self", summary: "SUSE Bug 1202765", url: "https://bugzilla.suse.com/1202765", }, { category: "self", summary: "SUSE Bug 1202766", url: "https://bugzilla.suse.com/1202766", }, { category: "self", summary: "SUSE Bug 1202767", url: "https://bugzilla.suse.com/1202767", }, { category: "self", summary: "SUSE Bug 1202768", url: "https://bugzilla.suse.com/1202768", }, { category: "self", summary: "SUSE Bug 1202769", url: "https://bugzilla.suse.com/1202769", }, { category: "self", summary: "SUSE Bug 1202770", url: "https://bugzilla.suse.com/1202770", }, { category: "self", summary: "SUSE Bug 1202771", url: "https://bugzilla.suse.com/1202771", }, { category: "self", summary: "SUSE Bug 1202773", url: "https://bugzilla.suse.com/1202773", }, { category: "self", summary: "SUSE Bug 1202774", url: "https://bugzilla.suse.com/1202774", }, { category: "self", summary: "SUSE Bug 1202775", url: "https://bugzilla.suse.com/1202775", }, { category: "self", summary: "SUSE Bug 1202776", url: "https://bugzilla.suse.com/1202776", }, { category: "self", summary: "SUSE Bug 1202778", url: "https://bugzilla.suse.com/1202778", }, { category: "self", summary: "SUSE Bug 1202779", url: "https://bugzilla.suse.com/1202779", }, { category: "self", summary: "SUSE Bug 1202780", url: "https://bugzilla.suse.com/1202780", }, { category: "self", summary: "SUSE Bug 1202781", url: "https://bugzilla.suse.com/1202781", }, { category: "self", summary: "SUSE Bug 1202782", url: "https://bugzilla.suse.com/1202782", }, { category: "self", summary: "SUSE Bug 1202783", url: "https://bugzilla.suse.com/1202783", }, { category: "self", summary: "SUSE Bug 1202822", url: "https://bugzilla.suse.com/1202822", }, { category: "self", summary: "SUSE Bug 1202823", url: "https://bugzilla.suse.com/1202823", }, { category: "self", summary: "SUSE Bug 1202824", url: "https://bugzilla.suse.com/1202824", }, { category: "self", summary: "SUSE Bug 1202860", url: "https://bugzilla.suse.com/1202860", }, { category: "self", summary: "SUSE Bug 1202867", url: "https://bugzilla.suse.com/1202867", }, { category: "self", summary: "SUSE Bug 1202872", url: "https://bugzilla.suse.com/1202872", }, { category: "self", summary: "SUSE Bug 1202874", url: "https://bugzilla.suse.com/1202874", }, { category: "self", summary: "SUSE Bug 1202898", url: "https://bugzilla.suse.com/1202898", }, { category: "self", summary: "SUSE Bug 1202914", url: "https://bugzilla.suse.com/1202914", }, { category: "self", summary: "SUSE Bug 1202960", url: "https://bugzilla.suse.com/1202960", }, { category: "self", summary: "SUSE Bug 1202989", url: "https://bugzilla.suse.com/1202989", }, { category: "self", summary: "SUSE Bug 1202992", url: "https://bugzilla.suse.com/1202992", }, { category: "self", summary: "SUSE Bug 1202993", url: "https://bugzilla.suse.com/1202993", }, { category: "self", summary: "SUSE Bug 1203002", url: "https://bugzilla.suse.com/1203002", }, { category: "self", summary: "SUSE Bug 1203008", url: "https://bugzilla.suse.com/1203008", }, { category: "self", summary: "SUSE Bug 1203036", url: "https://bugzilla.suse.com/1203036", }, { category: "self", summary: "SUSE Bug 1203039", url: "https://bugzilla.suse.com/1203039", }, { category: "self", summary: "SUSE Bug 1203041", url: "https://bugzilla.suse.com/1203041", }, { category: "self", summary: "SUSE Bug 1203063", url: "https://bugzilla.suse.com/1203063", }, { category: "self", summary: "SUSE Bug 1203066", url: "https://bugzilla.suse.com/1203066", }, { category: "self", summary: "SUSE Bug 1203067", url: "https://bugzilla.suse.com/1203067", }, { category: "self", summary: "SUSE Bug 1203098", url: "https://bugzilla.suse.com/1203098", }, { category: "self", summary: "SUSE Bug 1203101", url: "https://bugzilla.suse.com/1203101", }, { category: "self", summary: "SUSE Bug 1203107", url: "https://bugzilla.suse.com/1203107", }, { category: "self", summary: "SUSE Bug 1203116", url: "https://bugzilla.suse.com/1203116", }, { category: "self", summary: "SUSE Bug 1203117", url: "https://bugzilla.suse.com/1203117", }, { category: "self", summary: "SUSE Bug 1203138", url: "https://bugzilla.suse.com/1203138", }, { category: "self", summary: "SUSE Bug 1203139", url: "https://bugzilla.suse.com/1203139", }, { category: "self", summary: "SUSE Bug 1203159", url: "https://bugzilla.suse.com/1203159", }, { category: "self", summary: "SUSE Bug 1203183", url: "https://bugzilla.suse.com/1203183", }, { category: "self", summary: "SUSE Bug 1203197", url: "https://bugzilla.suse.com/1203197", }, { category: "self", summary: "SUSE Bug 1203208", url: "https://bugzilla.suse.com/1203208", }, { category: "self", summary: "SUSE Bug 1203229", url: "https://bugzilla.suse.com/1203229", }, { category: "self", summary: "SUSE Bug 1203263", url: "https://bugzilla.suse.com/1203263", }, { category: "self", summary: "SUSE Bug 1203290", url: "https://bugzilla.suse.com/1203290", }, { category: "self", summary: "SUSE Bug 1203338", url: "https://bugzilla.suse.com/1203338", }, { category: "self", summary: "SUSE Bug 1203360", url: "https://bugzilla.suse.com/1203360", }, { category: "self", summary: "SUSE Bug 1203361", url: "https://bugzilla.suse.com/1203361", }, { category: "self", summary: "SUSE Bug 1203389", url: "https://bugzilla.suse.com/1203389", }, { category: "self", summary: "SUSE Bug 1203391", url: "https://bugzilla.suse.com/1203391", }, { category: "self", summary: "SUSE Bug 1203410", url: "https://bugzilla.suse.com/1203410", }, { category: "self", summary: "SUSE Bug 1203435", url: "https://bugzilla.suse.com/1203435", }, { category: "self", summary: "SUSE Bug 1203505", url: "https://bugzilla.suse.com/1203505", }, { category: "self", summary: "SUSE Bug 1203511", url: "https://bugzilla.suse.com/1203511", }, { category: "self", summary: "SUSE Bug 1203514", url: "https://bugzilla.suse.com/1203514", }, { category: "self", summary: "SUSE Bug 1203552", url: "https://bugzilla.suse.com/1203552", }, { category: "self", summary: "SUSE Bug 1203606", url: "https://bugzilla.suse.com/1203606", }, { category: "self", summary: "SUSE Bug 1203664", url: "https://bugzilla.suse.com/1203664", }, { category: "self", summary: "SUSE Bug 1203693", url: "https://bugzilla.suse.com/1203693", }, { category: "self", summary: "SUSE Bug 1203699", url: "https://bugzilla.suse.com/1203699", }, { category: "self", summary: "SUSE Bug 1203767", url: "https://bugzilla.suse.com/1203767", }, { category: "self", summary: "SUSE Bug 1203769", url: "https://bugzilla.suse.com/1203769", }, { category: "self", summary: "SUSE Bug 1203770", url: "https://bugzilla.suse.com/1203770", }, { category: "self", summary: "SUSE Bug 1203794", url: "https://bugzilla.suse.com/1203794", }, { category: "self", summary: "SUSE Bug 1203798", url: "https://bugzilla.suse.com/1203798", }, { category: "self", summary: "SUSE Bug 1203802", url: "https://bugzilla.suse.com/1203802", }, { category: "self", summary: "SUSE Bug 1203829", url: "https://bugzilla.suse.com/1203829", }, { category: "self", summary: "SUSE Bug 1203893", url: "https://bugzilla.suse.com/1203893", }, { category: "self", summary: "SUSE Bug 1203902", url: "https://bugzilla.suse.com/1203902", }, { category: "self", summary: "SUSE Bug 1203906", url: "https://bugzilla.suse.com/1203906", }, { category: "self", summary: "SUSE Bug 1203908", url: "https://bugzilla.suse.com/1203908", }, { category: "self", summary: "SUSE Bug 1203922", url: "https://bugzilla.suse.com/1203922", }, { category: "self", summary: "SUSE Bug 1203935", url: "https://bugzilla.suse.com/1203935", }, { category: "self", summary: "SUSE Bug 1203939", url: "https://bugzilla.suse.com/1203939", }, { category: "self", summary: "SUSE Bug 1203960", url: "https://bugzilla.suse.com/1203960", }, { category: "self", summary: "SUSE Bug 1203969", url: "https://bugzilla.suse.com/1203969", }, { category: "self", summary: "SUSE Bug 1203987", url: "https://bugzilla.suse.com/1203987", }, { category: "self", summary: "SUSE Bug 1203992", url: "https://bugzilla.suse.com/1203992", }, { category: "self", summary: "SUSE Bug 1203994", url: "https://bugzilla.suse.com/1203994", }, { category: "self", summary: "SUSE Bug 1204017", url: "https://bugzilla.suse.com/1204017", }, { category: "self", summary: "SUSE Bug 1204051", url: "https://bugzilla.suse.com/1204051", }, { category: "self", summary: "SUSE Bug 1204059", url: "https://bugzilla.suse.com/1204059", }, { category: "self", summary: "SUSE Bug 1204060", url: "https://bugzilla.suse.com/1204060", }, { category: "self", summary: "SUSE Bug 1204092", url: "https://bugzilla.suse.com/1204092", }, { category: "self", summary: "SUSE Bug 1204125", url: "https://bugzilla.suse.com/1204125", }, { category: "self", summary: "SUSE Bug 1204132", url: "https://bugzilla.suse.com/1204132", }, { category: "self", summary: "SUSE Bug 1204142", url: "https://bugzilla.suse.com/1204142", }, { category: "self", summary: "SUSE Bug 1204166", url: "https://bugzilla.suse.com/1204166", }, { category: "self", summary: "SUSE Bug 1204168", url: "https://bugzilla.suse.com/1204168", }, { category: "self", summary: "SUSE Bug 1204170", url: "https://bugzilla.suse.com/1204170", }, { category: "self", summary: "SUSE Bug 1204171", url: "https://bugzilla.suse.com/1204171", }, { category: "self", summary: "SUSE Bug 1204183", url: "https://bugzilla.suse.com/1204183", }, { category: "self", summary: "SUSE Bug 1204228", url: "https://bugzilla.suse.com/1204228", }, { category: "self", summary: "SUSE Bug 1204241", url: "https://bugzilla.suse.com/1204241", }, { category: "self", summary: "SUSE Bug 1204289", url: "https://bugzilla.suse.com/1204289", }, { category: "self", summary: "SUSE Bug 1204290", url: "https://bugzilla.suse.com/1204290", }, { category: "self", summary: "SUSE Bug 1204291", url: "https://bugzilla.suse.com/1204291", }, { category: "self", summary: "SUSE Bug 1204292", url: "https://bugzilla.suse.com/1204292", }, { category: "self", summary: "SUSE Bug 1204353", url: "https://bugzilla.suse.com/1204353", }, { category: "self", summary: "SUSE Bug 1204354", url: "https://bugzilla.suse.com/1204354", }, { category: "self", summary: "SUSE Bug 1204355", url: "https://bugzilla.suse.com/1204355", }, { category: "self", summary: "SUSE Bug 1204402", url: "https://bugzilla.suse.com/1204402", }, { category: "self", summary: "SUSE Bug 1204405", url: "https://bugzilla.suse.com/1204405", }, { category: "self", summary: "SUSE Bug 1204413", url: "https://bugzilla.suse.com/1204413", }, { category: "self", summary: "SUSE Bug 1204414", url: "https://bugzilla.suse.com/1204414", }, { category: "self", summary: "SUSE Bug 1204415", url: "https://bugzilla.suse.com/1204415", }, { category: "self", summary: "SUSE Bug 1204417", url: "https://bugzilla.suse.com/1204417", }, { category: "self", summary: "SUSE Bug 1204424", url: "https://bugzilla.suse.com/1204424", }, { category: "self", summary: "SUSE Bug 1204428", url: "https://bugzilla.suse.com/1204428", }, { category: "self", summary: "SUSE Bug 1204431", url: "https://bugzilla.suse.com/1204431", }, { category: "self", summary: "SUSE Bug 1204432", url: "https://bugzilla.suse.com/1204432", }, { category: "self", summary: "SUSE Bug 1204439", url: "https://bugzilla.suse.com/1204439", }, { category: "self", summary: "SUSE Bug 1204470", url: "https://bugzilla.suse.com/1204470", }, { category: "self", summary: "SUSE Bug 1204479", url: "https://bugzilla.suse.com/1204479", }, { category: "self", summary: "SUSE Bug 1204486", url: "https://bugzilla.suse.com/1204486", }, { category: "self", summary: "SUSE Bug 1204498", url: "https://bugzilla.suse.com/1204498", }, { category: "self", summary: "SUSE Bug 1204533", url: "https://bugzilla.suse.com/1204533", }, { category: "self", summary: "SUSE Bug 1204569", url: "https://bugzilla.suse.com/1204569", }, { category: "self", summary: "SUSE Bug 1204574", url: "https://bugzilla.suse.com/1204574", }, { category: "self", summary: "SUSE Bug 1204575", url: "https://bugzilla.suse.com/1204575", }, { category: "self", summary: "SUSE Bug 1204576", url: "https://bugzilla.suse.com/1204576", }, { category: "self", summary: "SUSE Bug 1204619", url: "https://bugzilla.suse.com/1204619", }, { category: "self", summary: "SUSE Bug 1204624", url: "https://bugzilla.suse.com/1204624", }, { category: "self", summary: "SUSE Bug 1204631", url: "https://bugzilla.suse.com/1204631", }, { category: "self", summary: "SUSE Bug 1204635", url: "https://bugzilla.suse.com/1204635", }, { category: "self", summary: "SUSE Bug 1204636", url: "https://bugzilla.suse.com/1204636", }, { category: "self", summary: "SUSE Bug 1204637", url: "https://bugzilla.suse.com/1204637", }, { category: "self", summary: "SUSE Bug 1204646", url: "https://bugzilla.suse.com/1204646", }, { category: "self", summary: "SUSE Bug 1204647", url: "https://bugzilla.suse.com/1204647", }, { category: "self", summary: "SUSE Bug 1204650", url: "https://bugzilla.suse.com/1204650", }, { category: "self", summary: "SUSE Bug 1204653", url: "https://bugzilla.suse.com/1204653", }, { category: "self", summary: "SUSE Bug 1204693", url: "https://bugzilla.suse.com/1204693", }, { category: "self", summary: "SUSE Bug 1204705", url: "https://bugzilla.suse.com/1204705", }, { category: "self", summary: "SUSE Bug 1204719", url: "https://bugzilla.suse.com/1204719", }, { category: "self", summary: "SUSE Bug 1204728", url: "https://bugzilla.suse.com/1204728", }, { category: "self", summary: "SUSE Bug 1204745", url: "https://bugzilla.suse.com/1204745", }, { category: "self", summary: "SUSE Bug 1204753", url: "https://bugzilla.suse.com/1204753", }, { category: "self", summary: "SUSE Bug 1204780", url: "https://bugzilla.suse.com/1204780", }, { category: "self", summary: "SUSE Bug 1204810", url: "https://bugzilla.suse.com/1204810", }, { category: "self", summary: "SUSE Bug 1204850", url: "https://bugzilla.suse.com/1204850", }, { category: "self", summary: "SUSE Bug 1204868", url: "https://bugzilla.suse.com/1204868", }, { category: "self", summary: "SUSE Bug 1204926", url: "https://bugzilla.suse.com/1204926", }, { category: "self", summary: "SUSE Bug 1204933", url: "https://bugzilla.suse.com/1204933", }, { category: "self", summary: "SUSE Bug 1204934", url: "https://bugzilla.suse.com/1204934", }, { category: "self", summary: "SUSE Bug 1204947", url: "https://bugzilla.suse.com/1204947", }, { category: "self", summary: "SUSE Bug 1204957", url: "https://bugzilla.suse.com/1204957", }, { category: "self", summary: "SUSE Bug 1204963", url: "https://bugzilla.suse.com/1204963", }, { category: "self", summary: "SUSE Bug 1204970", url: "https://bugzilla.suse.com/1204970", }, { category: "self", summary: "SUSE Bug 1205007", url: "https://bugzilla.suse.com/1205007", }, { category: "self", summary: "SUSE Bug 1205100", url: "https://bugzilla.suse.com/1205100", }, { category: "self", summary: "SUSE Bug 1205111", url: "https://bugzilla.suse.com/1205111", }, { category: "self", summary: "SUSE Bug 1205113", url: "https://bugzilla.suse.com/1205113", }, { category: "self", summary: "SUSE Bug 1205128", url: "https://bugzilla.suse.com/1205128", }, { category: "self", summary: "SUSE Bug 1205130", url: "https://bugzilla.suse.com/1205130", }, { category: "self", summary: "SUSE Bug 1205149", url: "https://bugzilla.suse.com/1205149", }, { category: "self", summary: "SUSE Bug 1205153", url: "https://bugzilla.suse.com/1205153", }, { category: "self", summary: "SUSE Bug 1205220", url: "https://bugzilla.suse.com/1205220", }, { category: "self", summary: "SUSE Bug 1205257", url: "https://bugzilla.suse.com/1205257", }, { category: "self", summary: "SUSE Bug 1205264", url: "https://bugzilla.suse.com/1205264", }, { category: "self", summary: "SUSE Bug 1205282", url: "https://bugzilla.suse.com/1205282", }, { category: "self", summary: "SUSE Bug 1205313", url: "https://bugzilla.suse.com/1205313", }, { category: "self", summary: "SUSE Bug 1205331", url: "https://bugzilla.suse.com/1205331", }, { category: "self", summary: "SUSE Bug 1205332", url: "https://bugzilla.suse.com/1205332", }, { category: "self", summary: "SUSE Bug 1205427", url: "https://bugzilla.suse.com/1205427", }, { category: "self", summary: "SUSE Bug 1205428", url: "https://bugzilla.suse.com/1205428", }, { category: "self", summary: "SUSE Bug 1205473", url: "https://bugzilla.suse.com/1205473", }, { category: "self", summary: "SUSE Bug 1205496", url: "https://bugzilla.suse.com/1205496", }, { category: "self", summary: "SUSE Bug 1205507", url: "https://bugzilla.suse.com/1205507", }, { category: "self", summary: "SUSE Bug 1205514", url: "https://bugzilla.suse.com/1205514", }, { category: "self", summary: "SUSE Bug 1205521", url: "https://bugzilla.suse.com/1205521", }, { category: "self", summary: "SUSE Bug 1205567", url: "https://bugzilla.suse.com/1205567", }, { category: "self", summary: "SUSE Bug 1205616", url: "https://bugzilla.suse.com/1205616", }, { category: "self", summary: "SUSE Bug 1205617", url: "https://bugzilla.suse.com/1205617", }, { category: "self", summary: "SUSE Bug 1205653", url: "https://bugzilla.suse.com/1205653", }, { category: "self", summary: "SUSE Bug 1205671", url: "https://bugzilla.suse.com/1205671", }, { category: "self", summary: "SUSE Bug 1205679", url: "https://bugzilla.suse.com/1205679", }, { category: "self", summary: "SUSE Bug 1205683", url: "https://bugzilla.suse.com/1205683", }, { category: "self", summary: "SUSE Bug 1205700", url: "https://bugzilla.suse.com/1205700", }, { category: "self", summary: "SUSE Bug 1205705", url: "https://bugzilla.suse.com/1205705", }, { category: "self", summary: "SUSE Bug 1205709", url: "https://bugzilla.suse.com/1205709", }, { category: "self", summary: "SUSE Bug 1205711", url: "https://bugzilla.suse.com/1205711", }, { category: "self", summary: "SUSE Bug 1205744", url: "https://bugzilla.suse.com/1205744", }, { category: "self", summary: "SUSE Bug 1205764", url: "https://bugzilla.suse.com/1205764", }, { category: "self", summary: "SUSE Bug 1205796", url: "https://bugzilla.suse.com/1205796", }, { category: "self", summary: "SUSE Bug 1205882", url: "https://bugzilla.suse.com/1205882", }, { category: "self", summary: "SUSE Bug 1205993", url: "https://bugzilla.suse.com/1205993", }, { category: "self", summary: "SUSE Bug 1206035", url: "https://bugzilla.suse.com/1206035", }, { category: "self", summary: "SUSE Bug 1206036", url: "https://bugzilla.suse.com/1206036", }, { category: "self", summary: "SUSE Bug 1206037", url: "https://bugzilla.suse.com/1206037", }, { category: "self", summary: "SUSE Bug 1206045", url: "https://bugzilla.suse.com/1206045", }, { category: "self", summary: "SUSE Bug 1206046", url: "https://bugzilla.suse.com/1206046", }, { category: "self", summary: "SUSE Bug 1206047", url: "https://bugzilla.suse.com/1206047", }, { category: "self", summary: "SUSE Bug 1206048", url: "https://bugzilla.suse.com/1206048", }, { category: "self", summary: "SUSE Bug 1206049", url: "https://bugzilla.suse.com/1206049", }, { category: "self", summary: "SUSE Bug 1206050", url: "https://bugzilla.suse.com/1206050", }, { category: "self", summary: "SUSE Bug 1206051", url: "https://bugzilla.suse.com/1206051", }, { category: "self", summary: "SUSE Bug 1206056", url: "https://bugzilla.suse.com/1206056", }, { category: "self", summary: "SUSE Bug 1206057", url: "https://bugzilla.suse.com/1206057", }, { category: "self", summary: "SUSE Bug 1206113", url: "https://bugzilla.suse.com/1206113", }, { category: "self", summary: "SUSE Bug 1206114", url: "https://bugzilla.suse.com/1206114", }, { category: "self", summary: "SUSE Bug 1206147", url: "https://bugzilla.suse.com/1206147", }, { category: "self", summary: "SUSE Bug 1206149", url: "https://bugzilla.suse.com/1206149", }, { category: "self", summary: "SUSE Bug 1206207", url: "https://bugzilla.suse.com/1206207", }, { category: "self", summary: "SUSE Bug 1206273", url: "https://bugzilla.suse.com/1206273", }, { category: "self", summary: "SUSE Bug 1206391", url: "https://bugzilla.suse.com/1206391", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2020-16119 page", url: "https://www.suse.com/security/cve/CVE-2020-16119/", }, { category: "self", summary: "SUSE CVE CVE-2020-36516 page", url: "https://www.suse.com/security/cve/CVE-2020-36516/", }, { category: "self", summary: "SUSE CVE CVE-2021-33135 page", url: "https://www.suse.com/security/cve/CVE-2021-33135/", }, { category: "self", summary: "SUSE CVE CVE-2021-4037 page", url: "https://www.suse.com/security/cve/CVE-2021-4037/", }, { category: "self", summary: "SUSE CVE CVE-2022-1184 page", url: "https://www.suse.com/security/cve/CVE-2022-1184/", }, { category: "self", summary: "SUSE CVE CVE-2022-1263 page", url: "https://www.suse.com/security/cve/CVE-2022-1263/", }, { category: "self", summary: "SUSE CVE CVE-2022-1882 page", url: "https://www.suse.com/security/cve/CVE-2022-1882/", }, { category: "self", summary: "SUSE CVE CVE-2022-20368 page", url: "https://www.suse.com/security/cve/CVE-2022-20368/", }, { category: "self", summary: "SUSE CVE CVE-2022-20369 page", url: "https://www.suse.com/security/cve/CVE-2022-20369/", }, { category: "self", summary: "SUSE CVE CVE-2022-2153 page", url: "https://www.suse.com/security/cve/CVE-2022-2153/", }, { category: "self", summary: "SUSE CVE CVE-2022-2586 page", url: "https://www.suse.com/security/cve/CVE-2022-2586/", }, { category: "self", summary: "SUSE CVE CVE-2022-2588 page", url: "https://www.suse.com/security/cve/CVE-2022-2588/", }, { category: "self", summary: "SUSE CVE CVE-2022-2602 page", url: "https://www.suse.com/security/cve/CVE-2022-2602/", }, { category: "self", summary: "SUSE CVE CVE-2022-26373 page", url: "https://www.suse.com/security/cve/CVE-2022-26373/", }, { category: "self", summary: "SUSE CVE CVE-2022-2639 page", url: "https://www.suse.com/security/cve/CVE-2022-2639/", }, { category: "self", summary: "SUSE CVE CVE-2022-2663 page", url: "https://www.suse.com/security/cve/CVE-2022-2663/", }, { category: "self", summary: "SUSE CVE CVE-2022-28356 page", url: "https://www.suse.com/security/cve/CVE-2022-28356/", }, { category: "self", summary: "SUSE CVE CVE-2022-28693 page", url: "https://www.suse.com/security/cve/CVE-2022-28693/", }, { category: "self", summary: "SUSE CVE CVE-2022-2873 page", url: "https://www.suse.com/security/cve/CVE-2022-2873/", }, { category: "self", summary: "SUSE CVE CVE-2022-28748 page", url: "https://www.suse.com/security/cve/CVE-2022-28748/", }, { category: "self", summary: "SUSE CVE CVE-2022-2905 page", url: "https://www.suse.com/security/cve/CVE-2022-2905/", }, { category: "self", summary: "SUSE CVE CVE-2022-2938 page", url: "https://www.suse.com/security/cve/CVE-2022-2938/", }, { category: "self", summary: "SUSE CVE CVE-2022-2959 page", url: "https://www.suse.com/security/cve/CVE-2022-2959/", }, { category: "self", summary: "SUSE CVE CVE-2022-2964 page", url: "https://www.suse.com/security/cve/CVE-2022-2964/", }, { category: "self", summary: "SUSE CVE CVE-2022-2977 page", url: "https://www.suse.com/security/cve/CVE-2022-2977/", }, { category: "self", summary: "SUSE CVE CVE-2022-2978 page", url: "https://www.suse.com/security/cve/CVE-2022-2978/", }, { category: "self", summary: "SUSE CVE CVE-2022-3028 page", url: "https://www.suse.com/security/cve/CVE-2022-3028/", }, { category: "self", summary: "SUSE CVE CVE-2022-3078 page", url: "https://www.suse.com/security/cve/CVE-2022-3078/", }, { category: "self", summary: "SUSE CVE CVE-2022-3114 page", url: "https://www.suse.com/security/cve/CVE-2022-3114/", }, { category: "self", summary: "SUSE CVE CVE-2022-3169 page", url: "https://www.suse.com/security/cve/CVE-2022-3169/", }, { category: "self", summary: "SUSE CVE CVE-2022-3176 page", url: "https://www.suse.com/security/cve/CVE-2022-3176/", }, { category: "self", summary: "SUSE CVE CVE-2022-3202 page", url: "https://www.suse.com/security/cve/CVE-2022-3202/", }, { category: "self", summary: "SUSE CVE CVE-2022-32250 page", url: "https://www.suse.com/security/cve/CVE-2022-32250/", }, { category: "self", summary: "SUSE CVE CVE-2022-32296 page", url: "https://www.suse.com/security/cve/CVE-2022-32296/", }, { category: "self", summary: "SUSE CVE CVE-2022-3239 page", url: "https://www.suse.com/security/cve/CVE-2022-3239/", }, { category: "self", summary: "SUSE CVE CVE-2022-3303 page", url: "https://www.suse.com/security/cve/CVE-2022-3303/", }, { category: "self", summary: "SUSE CVE CVE-2022-33981 page", url: "https://www.suse.com/security/cve/CVE-2022-33981/", }, { category: "self", summary: "SUSE CVE CVE-2022-3424 page", url: "https://www.suse.com/security/cve/CVE-2022-3424/", }, { category: "self", summary: "SUSE CVE CVE-2022-3435 page", url: "https://www.suse.com/security/cve/CVE-2022-3435/", }, { category: "self", summary: "SUSE CVE CVE-2022-3521 page", url: "https://www.suse.com/security/cve/CVE-2022-3521/", }, { category: "self", summary: "SUSE CVE CVE-2022-3524 page", url: "https://www.suse.com/security/cve/CVE-2022-3524/", }, { category: "self", summary: "SUSE CVE CVE-2022-3526 page", url: "https://www.suse.com/security/cve/CVE-2022-3526/", }, { category: "self", summary: "SUSE CVE CVE-2022-3535 page", url: "https://www.suse.com/security/cve/CVE-2022-3535/", }, { category: "self", summary: "SUSE CVE CVE-2022-3542 page", url: "https://www.suse.com/security/cve/CVE-2022-3542/", }, { category: "self", summary: "SUSE CVE CVE-2022-3545 page", url: "https://www.suse.com/security/cve/CVE-2022-3545/", }, { category: "self", summary: "SUSE CVE CVE-2022-3565 page", url: "https://www.suse.com/security/cve/CVE-2022-3565/", }, { category: "self", summary: "SUSE CVE CVE-2022-3566 page", url: "https://www.suse.com/security/cve/CVE-2022-3566/", }, { category: "self", summary: "SUSE CVE CVE-2022-3567 page", url: "https://www.suse.com/security/cve/CVE-2022-3567/", }, { category: "self", summary: "SUSE CVE CVE-2022-3577 page", url: "https://www.suse.com/security/cve/CVE-2022-3577/", }, { category: "self", summary: "SUSE CVE CVE-2022-3586 page", url: "https://www.suse.com/security/cve/CVE-2022-3586/", }, { category: "self", summary: "SUSE CVE CVE-2022-3594 page", url: "https://www.suse.com/security/cve/CVE-2022-3594/", }, { category: "self", summary: "SUSE CVE CVE-2022-3619 page", url: "https://www.suse.com/security/cve/CVE-2022-3619/", }, { category: "self", summary: "SUSE CVE CVE-2022-3621 page", url: "https://www.suse.com/security/cve/CVE-2022-3621/", }, { category: "self", summary: "SUSE CVE CVE-2022-3625 page", url: "https://www.suse.com/security/cve/CVE-2022-3625/", }, { category: "self", summary: "SUSE CVE CVE-2022-3628 page", url: "https://www.suse.com/security/cve/CVE-2022-3628/", }, { category: "self", summary: "SUSE CVE CVE-2022-3629 page", url: "https://www.suse.com/security/cve/CVE-2022-3629/", }, { category: "self", summary: "SUSE CVE CVE-2022-3633 page", url: "https://www.suse.com/security/cve/CVE-2022-3633/", }, { category: "self", summary: "SUSE CVE CVE-2022-3635 page", url: "https://www.suse.com/security/cve/CVE-2022-3635/", }, { category: "self", summary: "SUSE CVE CVE-2022-3640 page", url: "https://www.suse.com/security/cve/CVE-2022-3640/", }, { category: "self", summary: "SUSE CVE CVE-2022-3643 page", url: "https://www.suse.com/security/cve/CVE-2022-3643/", }, { category: "self", summary: "SUSE CVE CVE-2022-3646 page", url: "https://www.suse.com/security/cve/CVE-2022-3646/", }, { category: "self", summary: "SUSE CVE CVE-2022-3649 page", url: "https://www.suse.com/security/cve/CVE-2022-3649/", }, { category: "self", summary: "SUSE CVE CVE-2022-36879 page", url: "https://www.suse.com/security/cve/CVE-2022-36879/", }, { category: "self", summary: "SUSE CVE CVE-2022-36946 page", url: "https://www.suse.com/security/cve/CVE-2022-36946/", }, { category: "self", summary: "SUSE CVE CVE-2022-3707 page", url: "https://www.suse.com/security/cve/CVE-2022-3707/", }, { category: "self", summary: "SUSE CVE CVE-2022-3903 page", url: "https://www.suse.com/security/cve/CVE-2022-3903/", }, { category: "self", summary: "SUSE CVE CVE-2022-39188 page", url: "https://www.suse.com/security/cve/CVE-2022-39188/", }, { category: "self", summary: "SUSE CVE CVE-2022-39189 page", url: "https://www.suse.com/security/cve/CVE-2022-39189/", }, { category: "self", summary: "SUSE CVE CVE-2022-39190 page", url: "https://www.suse.com/security/cve/CVE-2022-39190/", }, { category: "self", summary: "SUSE CVE CVE-2022-40476 page", url: "https://www.suse.com/security/cve/CVE-2022-40476/", }, { category: "self", summary: "SUSE CVE CVE-2022-40768 page", url: "https://www.suse.com/security/cve/CVE-2022-40768/", }, { category: "self", summary: "SUSE CVE CVE-2022-4095 page", url: "https://www.suse.com/security/cve/CVE-2022-4095/", }, { category: "self", summary: "SUSE CVE CVE-2022-41218 page", url: "https://www.suse.com/security/cve/CVE-2022-41218/", }, { category: "self", summary: "SUSE CVE CVE-2022-4129 page", url: "https://www.suse.com/security/cve/CVE-2022-4129/", }, { category: "self", summary: "SUSE CVE CVE-2022-4139 page", url: "https://www.suse.com/security/cve/CVE-2022-4139/", }, { category: "self", summary: "SUSE CVE CVE-2022-41674 page", url: "https://www.suse.com/security/cve/CVE-2022-41674/", }, { category: "self", summary: "SUSE CVE CVE-2022-41848 page", url: "https://www.suse.com/security/cve/CVE-2022-41848/", }, { category: "self", summary: "SUSE CVE CVE-2022-41849 page", url: "https://www.suse.com/security/cve/CVE-2022-41849/", }, { category: "self", summary: "SUSE CVE CVE-2022-41850 page", url: "https://www.suse.com/security/cve/CVE-2022-41850/", }, { category: "self", summary: "SUSE CVE CVE-2022-41858 page", url: "https://www.suse.com/security/cve/CVE-2022-41858/", }, { category: "self", summary: "SUSE CVE CVE-2022-42328 page", url: "https://www.suse.com/security/cve/CVE-2022-42328/", }, { category: "self", summary: "SUSE CVE CVE-2022-42329 page", url: "https://www.suse.com/security/cve/CVE-2022-42329/", }, { category: "self", summary: "SUSE CVE CVE-2022-42703 page", url: "https://www.suse.com/security/cve/CVE-2022-42703/", }, { category: "self", summary: "SUSE CVE CVE-2022-42719 page", url: "https://www.suse.com/security/cve/CVE-2022-42719/", }, { category: "self", summary: "SUSE CVE CVE-2022-42720 page", url: "https://www.suse.com/security/cve/CVE-2022-42720/", }, { category: "self", summary: "SUSE CVE CVE-2022-42721 page", url: "https://www.suse.com/security/cve/CVE-2022-42721/", }, { category: "self", summary: "SUSE CVE CVE-2022-42722 page", url: "https://www.suse.com/security/cve/CVE-2022-42722/", }, { category: "self", summary: "SUSE CVE CVE-2022-42895 page", url: "https://www.suse.com/security/cve/CVE-2022-42895/", }, { category: "self", summary: "SUSE CVE CVE-2022-42896 page", url: "https://www.suse.com/security/cve/CVE-2022-42896/", }, { category: "self", summary: "SUSE CVE CVE-2022-43750 page", url: "https://www.suse.com/security/cve/CVE-2022-43750/", }, { category: "self", summary: "SUSE CVE CVE-2022-4378 page", url: "https://www.suse.com/security/cve/CVE-2022-4378/", }, { category: "self", summary: "SUSE CVE CVE-2022-43945 page", url: "https://www.suse.com/security/cve/CVE-2022-43945/", }, { category: "self", summary: "SUSE CVE CVE-2022-45869 page", url: "https://www.suse.com/security/cve/CVE-2022-45869/", }, { category: "self", summary: "SUSE CVE CVE-2022-45888 page", url: "https://www.suse.com/security/cve/CVE-2022-45888/", }, { category: "self", summary: "SUSE CVE CVE-2022-45934 page", url: "https://www.suse.com/security/cve/CVE-2022-45934/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-12-23T10:39:17Z", generator: { date: "2022-12-23T10:39:17Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:4617-1", initial_release_date: "2022-12-23T10:39:17Z", revision_history: [ { date: "2022-12-23T10:39:17Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.14.21-150400.15.5.1.noarch", product: { name: "kernel-devel-rt-5.14.21-150400.15.5.1.noarch", product_id: "kernel-devel-rt-5.14.21-150400.15.5.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.14.21-150400.15.5.1.noarch", product: { name: "kernel-source-rt-5.14.21-150400.15.5.1.noarch", product_id: "kernel-source-rt-5.14.21-150400.15.5.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", product: { name: "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", product_id: "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", product: { name: "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", product_id: "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", product: { name: "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", product_id: "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", product_id: "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-rt-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-rt-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-rt-extra-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-rt-livepatch-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-rt-optional-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", product: { name: "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", product_id: "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64", product: { name: "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64", product_id: "kselftests-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", product: { name: "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", product_id: "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64", product: { name: "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64", product_id: "reiserfs-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP4", product: { name: "SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp4", }, }, }, { category: "product_name", name: "SUSE Real Time Module 15 SP4", product: { name: "SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150400.15.5.1.noarch as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150400.15.5.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.5.1.noarch as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.5.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150400.15.5.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150400.15.5.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.5.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.5.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2020-16119", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16119", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16119", url: "https://www.suse.com/security/cve/CVE-2020-16119", }, { category: "external", summary: "SUSE Bug 1177471 for CVE-2020-16119", url: "https://bugzilla.suse.com/1177471", }, { category: "external", summary: "SUSE Bug 1177742 for CVE-2020-16119", url: "https://bugzilla.suse.com/1177742", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2020-16119", }, { cve: "CVE-2020-36516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36516", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36516", url: "https://www.suse.com/security/cve/CVE-2020-36516", }, { category: "external", summary: "SUSE Bug 1196616 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196616", }, { category: "external", summary: "SUSE Bug 1196867 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196867", }, { category: "external", summary: "SUSE Bug 1204092 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204092", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204183", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2020-36516", }, { cve: "CVE-2021-33135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-33135", }, ], notes: [ { category: "general", text: "Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-33135", url: "https://www.suse.com/security/cve/CVE-2021-33135", }, { category: "external", summary: "SUSE Bug 1199515 for CVE-2021-33135", url: "https://bugzilla.suse.com/1199515", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2021-33135", }, { cve: "CVE-2021-4037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4037", }, ], notes: [ { category: "general", text: "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4037", url: "https://www.suse.com/security/cve/CVE-2021-4037", }, { category: "external", summary: "SUSE Bug 1198702 for CVE-2021-4037", url: "https://bugzilla.suse.com/1198702", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2021-4037", }, { cve: "CVE-2022-1184", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1184", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel's filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1184", url: "https://www.suse.com/security/cve/CVE-2022-1184", }, { category: "external", summary: "SUSE Bug 1198577 for CVE-2022-1184", url: "https://bugzilla.suse.com/1198577", }, { category: "external", summary: "SUSE Bug 1210859 for CVE-2022-1184", url: "https://bugzilla.suse.com/1210859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-1184", }, { cve: "CVE-2022-1263", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1263", }, ], notes: [ { category: "general", text: "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1263", url: "https://www.suse.com/security/cve/CVE-2022-1263", }, { category: "external", summary: "SUSE Bug 1198189 for CVE-2022-1263", url: "https://bugzilla.suse.com/1198189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-1263", }, { cve: "CVE-2022-1882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1882", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1882", url: "https://www.suse.com/security/cve/CVE-2022-1882", }, { category: "external", summary: "SUSE Bug 1199904 for CVE-2022-1882", url: "https://bugzilla.suse.com/1199904", }, { category: "external", summary: "SUSE Bug 1200058 for CVE-2022-1882", url: "https://bugzilla.suse.com/1200058", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-1882", }, { cve: "CVE-2022-20368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20368", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20368", url: "https://www.suse.com/security/cve/CVE-2022-20368", }, { category: "external", summary: "SUSE Bug 1202346 for CVE-2022-20368", url: "https://bugzilla.suse.com/1202346", }, { category: "external", summary: "SUSE Bug 1212311 for CVE-2022-20368", url: "https://bugzilla.suse.com/1212311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20369", }, ], notes: [ { category: "general", text: "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20369", url: "https://www.suse.com/security/cve/CVE-2022-20369", }, { category: "external", summary: "SUSE Bug 1202347 for CVE-2022-20369", url: "https://bugzilla.suse.com/1202347", }, { category: "external", summary: "SUSE Bug 1212321 for CVE-2022-20369", url: "https://bugzilla.suse.com/1212321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-20369", }, { cve: "CVE-2022-2153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2153", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2153", url: "https://www.suse.com/security/cve/CVE-2022-2153", }, { category: "external", summary: "SUSE Bug 1200788 for CVE-2022-2153", url: "https://bugzilla.suse.com/1200788", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-2153", }, { cve: "CVE-2022-2586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2586", }, ], notes: [ { category: "general", text: "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2586", url: "https://www.suse.com/security/cve/CVE-2022-2586", }, { category: "external", summary: "SUSE Bug 1202095 for CVE-2022-2586", url: "https://bugzilla.suse.com/1202095", }, { category: "external", summary: "SUSE Bug 1209719 for CVE-2022-2586", url: "https://bugzilla.suse.com/1209719", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-2586", }, { cve: "CVE-2022-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2588", }, ], notes: [ { category: "general", text: "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2588", url: "https://www.suse.com/security/cve/CVE-2022-2588", }, { category: "external", summary: "SUSE Bug 1202096 for CVE-2022-2588", url: "https://bugzilla.suse.com/1202096", }, { category: "external", summary: "SUSE Bug 1203613 for CVE-2022-2588", url: "https://bugzilla.suse.com/1203613", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2022-2588", url: "https://bugzilla.suse.com/1204183", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-2588", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-2602", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2602", }, ], notes: [ { category: "general", text: "io_uring UAF, Unix SCM garbage collection", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2602", url: "https://www.suse.com/security/cve/CVE-2022-2602", }, { category: "external", summary: "SUSE Bug 1204228 for CVE-2022-2602", url: "https://bugzilla.suse.com/1204228", }, { category: "external", summary: "SUSE Bug 1205186 for CVE-2022-2602", url: "https://bugzilla.suse.com/1205186", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-2602", }, { cve: "CVE-2022-26373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26373", }, ], notes: [ { category: "general", text: "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26373", url: "https://www.suse.com/security/cve/CVE-2022-26373", }, { category: "external", summary: "SUSE Bug 1201726 for CVE-2022-26373", url: "https://bugzilla.suse.com/1201726", }, { category: "external", summary: "SUSE Bug 1209619 for CVE-2022-26373", url: "https://bugzilla.suse.com/1209619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2639", }, ], notes: [ { category: "general", text: "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2639", url: "https://www.suse.com/security/cve/CVE-2022-2639", }, { category: "external", summary: "SUSE Bug 1202154 for CVE-2022-2639", url: "https://bugzilla.suse.com/1202154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-2639", }, { cve: "CVE-2022-2663", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2663", }, ], notes: [ { category: "general", text: "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2663", url: "https://www.suse.com/security/cve/CVE-2022-2663", }, { category: "external", summary: "SUSE Bug 1202097 for CVE-2022-2663", url: "https://bugzilla.suse.com/1202097", }, { category: "external", summary: "SUSE Bug 1212299 for CVE-2022-2663", url: "https://bugzilla.suse.com/1212299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-2663", }, { cve: "CVE-2022-28356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28356", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28356", url: "https://www.suse.com/security/cve/CVE-2022-28356", }, { category: "external", summary: "SUSE Bug 1197391 for CVE-2022-28356", url: "https://bugzilla.suse.com/1197391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-28356", }, { cve: "CVE-2022-28693", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28693", }, ], notes: [ { category: "general", text: "Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28693", url: "https://www.suse.com/security/cve/CVE-2022-28693", }, { category: "external", summary: "SUSE Bug 1201455 for CVE-2022-28693", url: "https://bugzilla.suse.com/1201455", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-28693", }, { cve: "CVE-2022-2873", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2873", }, ], notes: [ { category: "general", text: "An out-of-bounds memory access flaw was found in the Linux kernel Intel's iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2873", url: "https://www.suse.com/security/cve/CVE-2022-2873", }, { category: "external", summary: "SUSE Bug 1202558 for CVE-2022-2873", url: "https://bugzilla.suse.com/1202558", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-2873", }, { cve: "CVE-2022-28748", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28748", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28748", url: "https://www.suse.com/security/cve/CVE-2022-28748", }, { category: "external", summary: "SUSE Bug 1196018 for CVE-2022-28748", url: "https://bugzilla.suse.com/1196018", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2022-28748", }, { cve: "CVE-2022-2905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2905", }, ], notes: [ { category: "general", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2905", url: "https://www.suse.com/security/cve/CVE-2022-2905", }, { category: "external", summary: "SUSE Bug 1202860 for CVE-2022-2905", url: "https://bugzilla.suse.com/1202860", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-2938", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2938", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2938", url: "https://www.suse.com/security/cve/CVE-2022-2938", }, { category: "external", summary: "SUSE Bug 1202623 for CVE-2022-2938", url: "https://bugzilla.suse.com/1202623", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-2938", }, { cve: "CVE-2022-2959", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2959", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2959", url: "https://www.suse.com/security/cve/CVE-2022-2959", }, { category: "external", summary: "SUSE Bug 1202681 for CVE-2022-2959", url: "https://bugzilla.suse.com/1202681", }, { category: "external", summary: "SUSE Bug 1202685 for CVE-2022-2959", url: "https://bugzilla.suse.com/1202685", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-2959", }, { cve: "CVE-2022-2964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2964", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2964", url: "https://www.suse.com/security/cve/CVE-2022-2964", }, { category: "external", summary: "SUSE Bug 1202686 for CVE-2022-2964", url: "https://bugzilla.suse.com/1202686", }, { category: "external", summary: "SUSE Bug 1203008 for CVE-2022-2964", url: "https://bugzilla.suse.com/1203008", }, { category: "external", summary: "SUSE Bug 1208044 for CVE-2022-2964", url: "https://bugzilla.suse.com/1208044", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-2964", }, { cve: "CVE-2022-2977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2977", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2977", url: "https://www.suse.com/security/cve/CVE-2022-2977", }, { category: "external", summary: "SUSE Bug 1202672 for CVE-2022-2977", url: "https://bugzilla.suse.com/1202672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-2977", }, { cve: "CVE-2022-2978", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2978", }, ], notes: [ { category: "general", text: "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2978", url: "https://www.suse.com/security/cve/CVE-2022-2978", }, { category: "external", summary: "SUSE Bug 1202700 for CVE-2022-2978", url: "https://bugzilla.suse.com/1202700", }, { category: "external", summary: "SUSE Bug 1204745 for CVE-2022-2978", url: "https://bugzilla.suse.com/1204745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-2978", }, { cve: "CVE-2022-3028", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3028", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3028", url: "https://www.suse.com/security/cve/CVE-2022-3028", }, { category: "external", summary: "SUSE Bug 1202898 for CVE-2022-3028", url: "https://bugzilla.suse.com/1202898", }, { category: "external", summary: "SUSE Bug 1212296 for CVE-2022-3028", url: "https://bugzilla.suse.com/1212296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-3078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3078", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3078", url: "https://www.suse.com/security/cve/CVE-2022-3078", }, { category: "external", summary: "SUSE Bug 1203041 for CVE-2022-3078", url: "https://bugzilla.suse.com/1203041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2022-3078", }, { cve: "CVE-2022-3114", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3114", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3114", url: "https://www.suse.com/security/cve/CVE-2022-3114", }, { category: "external", summary: "SUSE Bug 1206391 for CVE-2022-3114", url: "https://bugzilla.suse.com/1206391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3114", }, { cve: "CVE-2022-3169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3169", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3169", url: "https://www.suse.com/security/cve/CVE-2022-3169", }, { category: "external", summary: "SUSE Bug 1203290 for CVE-2022-3169", url: "https://bugzilla.suse.com/1203290", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3169", }, { cve: "CVE-2022-3176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3176", }, ], notes: [ { category: "general", text: "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3176", url: "https://www.suse.com/security/cve/CVE-2022-3176", }, { category: "external", summary: "SUSE Bug 1203391 for CVE-2022-3176", url: "https://bugzilla.suse.com/1203391", }, { category: "external", summary: "SUSE Bug 1203511 for CVE-2022-3176", url: "https://bugzilla.suse.com/1203511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-3176", }, { cve: "CVE-2022-3202", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3202", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3202", url: "https://www.suse.com/security/cve/CVE-2022-3202", }, { category: "external", summary: "SUSE Bug 1203389 for CVE-2022-3202", url: "https://bugzilla.suse.com/1203389", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3202", }, { cve: "CVE-2022-32250", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32250", }, ], notes: [ { category: "general", text: "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-32250", url: "https://www.suse.com/security/cve/CVE-2022-32250", }, { category: "external", summary: "SUSE Bug 1200015 for CVE-2022-32250", url: "https://bugzilla.suse.com/1200015", }, { category: "external", summary: "SUSE Bug 1200268 for CVE-2022-32250", url: "https://bugzilla.suse.com/1200268", }, { category: "external", summary: "SUSE Bug 1200494 for CVE-2022-32250", url: "https://bugzilla.suse.com/1200494", }, { category: "external", summary: "SUSE Bug 1202992 for CVE-2022-32250", url: "https://bugzilla.suse.com/1202992", }, { category: "external", summary: "SUSE Bug 1202993 for CVE-2022-32250", url: "https://bugzilla.suse.com/1202993", }, { category: "external", summary: "SUSE Bug 1203002 for CVE-2022-32250", url: "https://bugzilla.suse.com/1203002", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-32250", }, { cve: "CVE-2022-32296", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-32296", }, ], notes: [ { category: "general", text: "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-32296", url: "https://www.suse.com/security/cve/CVE-2022-32296", }, { category: "external", summary: "SUSE Bug 1200288 for CVE-2022-32296", url: "https://bugzilla.suse.com/1200288", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-32296", }, { cve: "CVE-2022-3239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3239", }, ], notes: [ { category: "general", text: "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3239", url: "https://www.suse.com/security/cve/CVE-2022-3239", }, { category: "external", summary: "SUSE Bug 1203552 for CVE-2022-3239", url: "https://bugzilla.suse.com/1203552", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3239", }, { cve: "CVE-2022-3303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3303", }, ], notes: [ { category: "general", text: "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3303", url: "https://www.suse.com/security/cve/CVE-2022-3303", }, { category: "external", summary: "SUSE Bug 1203769 for CVE-2022-3303", url: "https://bugzilla.suse.com/1203769", }, { category: "external", summary: "SUSE Bug 1212304 for CVE-2022-3303", url: "https://bugzilla.suse.com/1212304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3303", }, { cve: "CVE-2022-33981", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-33981", }, ], notes: [ { category: "general", text: "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-33981", url: "https://www.suse.com/security/cve/CVE-2022-33981", }, { category: "external", summary: "SUSE Bug 1200692 for CVE-2022-33981", url: "https://bugzilla.suse.com/1200692", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-33981", }, { cve: "CVE-2022-3424", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3424", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3424", url: "https://www.suse.com/security/cve/CVE-2022-3424", }, { category: "external", summary: "SUSE Bug 1204166 for CVE-2022-3424", url: "https://bugzilla.suse.com/1204166", }, { category: "external", summary: "SUSE Bug 1204167 for CVE-2022-3424", url: "https://bugzilla.suse.com/1204167", }, { category: "external", summary: "SUSE Bug 1208044 for CVE-2022-3424", url: "https://bugzilla.suse.com/1208044", }, { category: "external", summary: "SUSE Bug 1212309 for CVE-2022-3424", url: "https://bugzilla.suse.com/1212309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3424", }, { cve: "CVE-2022-3435", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3435", }, ], notes: [ { category: "general", text: "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3435", url: "https://www.suse.com/security/cve/CVE-2022-3435", }, { category: "external", summary: "SUSE Bug 1204171 for CVE-2022-3435", url: "https://bugzilla.suse.com/1204171", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3435", }, { cve: "CVE-2022-3521", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3521", }, ], notes: [ { category: "general", text: "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3521", url: "https://www.suse.com/security/cve/CVE-2022-3521", }, { category: "external", summary: "SUSE Bug 1204355 for CVE-2022-3521", url: "https://bugzilla.suse.com/1204355", }, { category: "external", summary: "SUSE Bug 1217458 for CVE-2022-3521", url: "https://bugzilla.suse.com/1217458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3521", }, { cve: "CVE-2022-3524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3524", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3524", url: "https://www.suse.com/security/cve/CVE-2022-3524", }, { category: "external", summary: "SUSE Bug 1204354 for CVE-2022-3524", url: "https://bugzilla.suse.com/1204354", }, { category: "external", summary: "SUSE Bug 1212320 for CVE-2022-3524", url: "https://bugzilla.suse.com/1212320", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3524", }, { cve: "CVE-2022-3526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3526", }, ], notes: [ { category: "general", text: "A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3526", url: "https://www.suse.com/security/cve/CVE-2022-3526", }, { category: "external", summary: "SUSE Bug 1204353 for CVE-2022-3526", url: "https://bugzilla.suse.com/1204353", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3526", }, { cve: "CVE-2022-3535", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3535", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3535", url: "https://www.suse.com/security/cve/CVE-2022-3535", }, { category: "external", summary: "SUSE Bug 1204417 for CVE-2022-3535", url: "https://bugzilla.suse.com/1204417", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2022-3535", }, { cve: "CVE-2022-3542", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3542", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3542", url: "https://www.suse.com/security/cve/CVE-2022-3542", }, { category: "external", summary: "SUSE Bug 1204402 for CVE-2022-3542", url: "https://bugzilla.suse.com/1204402", }, { category: "external", summary: "SUSE Bug 1217458 for CVE-2022-3542", url: "https://bugzilla.suse.com/1217458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3542", }, { cve: "CVE-2022-3545", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3545", }, ], notes: [ { category: "general", text: "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3545", url: "https://www.suse.com/security/cve/CVE-2022-3545", }, { category: "external", summary: "SUSE Bug 1204415 for CVE-2022-3545", url: "https://bugzilla.suse.com/1204415", }, { category: "external", summary: "SUSE Bug 1204424 for CVE-2022-3545", url: "https://bugzilla.suse.com/1204424", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-3545", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2022-3545", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-3545", }, { cve: "CVE-2022-3565", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3565", }, ], notes: [ { category: "general", text: "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3565", url: "https://www.suse.com/security/cve/CVE-2022-3565", }, { category: "external", summary: "SUSE Bug 1204431 for CVE-2022-3565", url: "https://bugzilla.suse.com/1204431", }, { category: "external", summary: "SUSE Bug 1204432 for CVE-2022-3565", url: "https://bugzilla.suse.com/1204432", }, { category: "external", summary: "SUSE Bug 1208044 for CVE-2022-3565", url: "https://bugzilla.suse.com/1208044", }, { category: "external", summary: "SUSE Bug 1212323 for CVE-2022-3565", url: "https://bugzilla.suse.com/1212323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-3565", }, { cve: "CVE-2022-3566", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3566", }, ], notes: [ { category: "general", text: "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3566", url: "https://www.suse.com/security/cve/CVE-2022-3566", }, { category: "external", summary: "SUSE Bug 1204405 for CVE-2022-3566", url: "https://bugzilla.suse.com/1204405", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3566", }, { cve: "CVE-2022-3567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3567", }, ], notes: [ { category: "general", text: "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3567", url: "https://www.suse.com/security/cve/CVE-2022-3567", }, { category: "external", summary: "SUSE Bug 1204414 for CVE-2022-3567", url: "https://bugzilla.suse.com/1204414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3567", }, { cve: "CVE-2022-3577", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3577", }, ], notes: [ { category: "general", text: "An out-of-bounds memory write flaw was found in the Linux kernel's Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3577", url: "https://www.suse.com/security/cve/CVE-2022-3577", }, { category: "external", summary: "SUSE Bug 1204470 for CVE-2022-3577", url: "https://bugzilla.suse.com/1204470", }, { category: "external", summary: "SUSE Bug 1204486 for CVE-2022-3577", url: "https://bugzilla.suse.com/1204486", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3577", }, { cve: "CVE-2022-3586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3586", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3586", url: "https://www.suse.com/security/cve/CVE-2022-3586", }, { category: "external", summary: "SUSE Bug 1204439 for CVE-2022-3586", url: "https://bugzilla.suse.com/1204439", }, { category: "external", summary: "SUSE Bug 1204576 for CVE-2022-3586", url: "https://bugzilla.suse.com/1204576", }, { category: "external", summary: "SUSE Bug 1208044 for CVE-2022-3586", url: "https://bugzilla.suse.com/1208044", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-3586", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1212294 for CVE-2022-3586", url: "https://bugzilla.suse.com/1212294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3586", }, { cve: "CVE-2022-3594", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3594", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3594", url: "https://www.suse.com/security/cve/CVE-2022-3594", }, { category: "external", summary: "SUSE Bug 1204479 for CVE-2022-3594", url: "https://bugzilla.suse.com/1204479", }, { category: "external", summary: "SUSE Bug 1217458 for CVE-2022-3594", url: "https://bugzilla.suse.com/1217458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3594", }, { cve: "CVE-2022-3619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3619", }, ], notes: [ { category: "general", text: "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3619", url: "https://www.suse.com/security/cve/CVE-2022-3619", }, { category: "external", summary: "SUSE Bug 1204569 for CVE-2022-3619", url: "https://bugzilla.suse.com/1204569", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3619", }, { cve: "CVE-2022-3621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3621", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3621", url: "https://www.suse.com/security/cve/CVE-2022-3621", }, { category: "external", summary: "SUSE Bug 1204574 for CVE-2022-3621", url: "https://bugzilla.suse.com/1204574", }, { category: "external", summary: "SUSE Bug 1212295 for CVE-2022-3621", url: "https://bugzilla.suse.com/1212295", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3621", }, { cve: "CVE-2022-3625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3625", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3625", url: "https://www.suse.com/security/cve/CVE-2022-3625", }, { category: "external", summary: "SUSE Bug 1204637 for CVE-2022-3625", url: "https://bugzilla.suse.com/1204637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3625", }, { cve: "CVE-2022-3628", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3628", }, ], notes: [ { category: "general", text: "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3628", url: "https://www.suse.com/security/cve/CVE-2022-3628", }, { category: "external", summary: "SUSE Bug 1204868 for CVE-2022-3628", url: "https://bugzilla.suse.com/1204868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3628", }, { cve: "CVE-2022-3629", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3629", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3629", url: "https://www.suse.com/security/cve/CVE-2022-3629", }, { category: "external", summary: "SUSE Bug 1204635 for CVE-2022-3629", url: "https://bugzilla.suse.com/1204635", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2022-3629", }, { cve: "CVE-2022-3633", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3633", }, ], notes: [ { category: "general", text: "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3633", url: "https://www.suse.com/security/cve/CVE-2022-3633", }, { category: "external", summary: "SUSE Bug 1204650 for CVE-2022-3633", url: "https://bugzilla.suse.com/1204650", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2022-3633", }, { cve: "CVE-2022-3635", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3635", }, ], notes: [ { category: "general", text: "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3635", url: "https://www.suse.com/security/cve/CVE-2022-3635", }, { category: "external", summary: "SUSE Bug 1204631 for CVE-2022-3635", url: "https://bugzilla.suse.com/1204631", }, { category: "external", summary: "SUSE Bug 1204636 for CVE-2022-3635", url: "https://bugzilla.suse.com/1204636", }, { category: "external", summary: "SUSE Bug 1208044 for CVE-2022-3635", url: "https://bugzilla.suse.com/1208044", }, { category: "external", summary: "SUSE Bug 1212289 for CVE-2022-3635", url: "https://bugzilla.suse.com/1212289", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-3635", }, { cve: "CVE-2022-3640", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3640", }, ], notes: [ { category: "general", text: "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3640", url: "https://www.suse.com/security/cve/CVE-2022-3640", }, { category: "external", summary: "SUSE Bug 1204619 for CVE-2022-3640", url: "https://bugzilla.suse.com/1204619", }, { category: "external", summary: "SUSE Bug 1204624 for CVE-2022-3640", url: "https://bugzilla.suse.com/1204624", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-3640", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-3640", }, { cve: "CVE-2022-3643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3643", }, ], notes: [ { category: "general", text: "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3643", url: "https://www.suse.com/security/cve/CVE-2022-3643", }, { category: "external", summary: "SUSE Bug 1206113 for CVE-2022-3643", url: "https://bugzilla.suse.com/1206113", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3643", }, { cve: "CVE-2022-3646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3646", }, ], notes: [ { category: "general", text: "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3646", url: "https://www.suse.com/security/cve/CVE-2022-3646", }, { category: "external", summary: "SUSE Bug 1204646 for CVE-2022-3646", url: "https://bugzilla.suse.com/1204646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2022-3646", }, { cve: "CVE-2022-3649", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3649", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3649", url: "https://www.suse.com/security/cve/CVE-2022-3649", }, { category: "external", summary: "SUSE Bug 1204647 for CVE-2022-3649", url: "https://bugzilla.suse.com/1204647", }, { category: "external", summary: "SUSE Bug 1212318 for CVE-2022-3649", url: "https://bugzilla.suse.com/1212318", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2022-3649", }, { cve: "CVE-2022-36879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36879", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36879", url: "https://www.suse.com/security/cve/CVE-2022-36879", }, { category: "external", summary: "SUSE Bug 1201948 for CVE-2022-36879", url: "https://bugzilla.suse.com/1201948", }, { category: "external", summary: "SUSE Bug 1212327 for CVE-2022-36879", url: "https://bugzilla.suse.com/1212327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36946", }, ], notes: [ { category: "general", text: "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36946", url: "https://www.suse.com/security/cve/CVE-2022-36946", }, { category: "external", summary: "SUSE Bug 1201940 for CVE-2022-36946", url: "https://bugzilla.suse.com/1201940", }, { category: "external", summary: "SUSE Bug 1201941 for CVE-2022-36946", url: "https://bugzilla.suse.com/1201941", }, { category: "external", summary: "SUSE Bug 1202312 for CVE-2022-36946", url: "https://bugzilla.suse.com/1202312", }, { category: "external", summary: "SUSE Bug 1202874 for CVE-2022-36946", url: "https://bugzilla.suse.com/1202874", }, { category: "external", summary: "SUSE Bug 1203208 for CVE-2022-36946", url: "https://bugzilla.suse.com/1203208", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-36946", url: "https://bugzilla.suse.com/1204132", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-36946", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1212310 for CVE-2022-36946", url: "https://bugzilla.suse.com/1212310", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-36946", }, { cve: "CVE-2022-3707", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3707", }, ], notes: [ { category: "general", text: "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3707", url: "https://www.suse.com/security/cve/CVE-2022-3707", }, { category: "external", summary: "SUSE Bug 1204780 for CVE-2022-3707", url: "https://bugzilla.suse.com/1204780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3707", }, { cve: "CVE-2022-3903", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3903", }, ], notes: [ { category: "general", text: "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3903", url: "https://www.suse.com/security/cve/CVE-2022-3903", }, { category: "external", summary: "SUSE Bug 1205220 for CVE-2022-3903", url: "https://bugzilla.suse.com/1205220", }, { category: "external", summary: "SUSE Bug 1212297 for CVE-2022-3903", url: "https://bugzilla.suse.com/1212297", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-3903", }, { cve: "CVE-2022-39188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39188", }, ], notes: [ { category: "general", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39188", url: "https://www.suse.com/security/cve/CVE-2022-39188", }, { category: "external", summary: "SUSE Bug 1203107 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203107", }, { category: "external", summary: "SUSE Bug 1203116 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203116", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-39188", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-39188", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1212326 for CVE-2022-39188", url: "https://bugzilla.suse.com/1212326", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39189", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39189", }, ], notes: [ { category: "general", text: "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39189", url: "https://www.suse.com/security/cve/CVE-2022-39189", }, { category: "external", summary: "SUSE Bug 1203066 for CVE-2022-39189", url: "https://bugzilla.suse.com/1203066", }, { category: "external", summary: "SUSE Bug 1203067 for CVE-2022-39189", url: "https://bugzilla.suse.com/1203067", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-39189", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-39189", }, { cve: "CVE-2022-39190", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39190", }, ], notes: [ { category: "general", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39190", url: "https://www.suse.com/security/cve/CVE-2022-39190", }, { category: "external", summary: "SUSE Bug 1203117 for CVE-2022-39190", url: "https://bugzilla.suse.com/1203117", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-39190", }, { cve: "CVE-2022-40476", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40476", }, ], notes: [ { category: "general", text: "A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40476", url: "https://www.suse.com/security/cve/CVE-2022-40476", }, { category: "external", summary: "SUSE Bug 1203435 for CVE-2022-40476", url: "https://bugzilla.suse.com/1203435", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-40476", }, { cve: "CVE-2022-40768", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40768", }, ], notes: [ { category: "general", text: "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40768", url: "https://www.suse.com/security/cve/CVE-2022-40768", }, { category: "external", summary: "SUSE Bug 1203514 for CVE-2022-40768", url: "https://bugzilla.suse.com/1203514", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-40768", }, { cve: "CVE-2022-4095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-4095", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-4095", url: "https://www.suse.com/security/cve/CVE-2022-4095", }, { category: "external", summary: "SUSE Bug 1205514 for CVE-2022-4095", url: "https://bugzilla.suse.com/1205514", }, { category: "external", summary: "SUSE Bug 1205594 for CVE-2022-4095", url: "https://bugzilla.suse.com/1205594", }, { category: "external", summary: "SUSE Bug 1208030 for CVE-2022-4095", url: "https://bugzilla.suse.com/1208030", }, { category: "external", summary: "SUSE Bug 1208085 for CVE-2022-4095", url: "https://bugzilla.suse.com/1208085", }, { category: "external", summary: "SUSE Bug 1212319 for CVE-2022-4095", url: "https://bugzilla.suse.com/1212319", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-4095", }, { cve: "CVE-2022-41218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41218", }, ], notes: [ { category: "general", text: "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41218", url: "https://www.suse.com/security/cve/CVE-2022-41218", }, { category: "external", summary: "SUSE Bug 1202960 for CVE-2022-41218", url: "https://bugzilla.suse.com/1202960", }, { category: "external", summary: "SUSE Bug 1203606 for CVE-2022-41218", url: "https://bugzilla.suse.com/1203606", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-41218", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41218", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-41218", }, { cve: "CVE-2022-4129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-4129", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-4129", url: "https://www.suse.com/security/cve/CVE-2022-4129", }, { category: "external", summary: "SUSE Bug 1205711 for CVE-2022-4129", url: "https://bugzilla.suse.com/1205711", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-4129", }, { cve: "CVE-2022-4139", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-4139", }, ], notes: [ { category: "general", text: "An incorrect TLB flush issue was found in the Linux kernel's GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-4139", url: "https://www.suse.com/security/cve/CVE-2022-4139", }, { category: "external", summary: "SUSE Bug 1205700 for CVE-2022-4139", url: "https://bugzilla.suse.com/1205700", }, { category: "external", summary: "SUSE Bug 1205815 for CVE-2022-4139", url: "https://bugzilla.suse.com/1205815", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-4139", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-4139", }, { cve: "CVE-2022-41674", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41674", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41674", url: "https://www.suse.com/security/cve/CVE-2022-41674", }, { category: "external", summary: "SUSE Bug 1203770 for CVE-2022-41674", url: "https://bugzilla.suse.com/1203770", }, { category: "external", summary: "SUSE Bug 1203994 for CVE-2022-41674", url: "https://bugzilla.suse.com/1203994", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41674", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-41674", }, { cve: "CVE-2022-41848", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41848", }, ], notes: [ { category: "general", text: "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41848", url: "https://www.suse.com/security/cve/CVE-2022-41848", }, { category: "external", summary: "SUSE Bug 1203987 for CVE-2022-41848", url: "https://bugzilla.suse.com/1203987", }, { category: "external", summary: "SUSE Bug 1211484 for CVE-2022-41848", url: "https://bugzilla.suse.com/1211484", }, { category: "external", summary: "SUSE Bug 1212317 for CVE-2022-41848", url: "https://bugzilla.suse.com/1212317", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-41848", }, { cve: "CVE-2022-41849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41849", }, ], notes: [ { category: "general", text: "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41849", url: "https://www.suse.com/security/cve/CVE-2022-41849", }, { category: "external", summary: "SUSE Bug 1203992 for CVE-2022-41849", url: "https://bugzilla.suse.com/1203992", }, { category: "external", summary: "SUSE Bug 1217458 for CVE-2022-41849", url: "https://bugzilla.suse.com/1217458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-41849", }, { cve: "CVE-2022-41850", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41850", }, ], notes: [ { category: "general", text: "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41850", url: "https://www.suse.com/security/cve/CVE-2022-41850", }, { category: "external", summary: "SUSE Bug 1203960 for CVE-2022-41850", url: "https://bugzilla.suse.com/1203960", }, { category: "external", summary: "SUSE Bug 1212314 for CVE-2022-41850", url: "https://bugzilla.suse.com/1212314", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2022-41850", }, { cve: "CVE-2022-41858", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41858", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41858", url: "https://www.suse.com/security/cve/CVE-2022-41858", }, { category: "external", summary: "SUSE Bug 1205671 for CVE-2022-41858", url: "https://bugzilla.suse.com/1205671", }, { category: "external", summary: "SUSE Bug 1211484 for CVE-2022-41858", url: "https://bugzilla.suse.com/1211484", }, { category: "external", summary: "SUSE Bug 1212300 for CVE-2022-41858", url: "https://bugzilla.suse.com/1212300", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-41858", }, { cve: "CVE-2022-42328", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42328", }, ], notes: [ { category: "general", text: "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42328", url: "https://www.suse.com/security/cve/CVE-2022-42328", }, { category: "external", summary: "SUSE Bug 1206114 for CVE-2022-42328", url: "https://bugzilla.suse.com/1206114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-42328", }, { cve: "CVE-2022-42329", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42329", }, ], notes: [ { category: "general", text: "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42329", url: "https://www.suse.com/security/cve/CVE-2022-42329", }, { category: "external", summary: "SUSE Bug 1206114 for CVE-2022-42329", url: "https://bugzilla.suse.com/1206114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-42329", }, { cve: "CVE-2022-42703", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42703", }, ], notes: [ { category: "general", text: "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42703", url: "https://www.suse.com/security/cve/CVE-2022-42703", }, { category: "external", summary: "SUSE Bug 1204168 for CVE-2022-42703", url: "https://bugzilla.suse.com/1204168", }, { category: "external", summary: "SUSE Bug 1204170 for CVE-2022-42703", url: "https://bugzilla.suse.com/1204170", }, { category: "external", summary: "SUSE Bug 1206463 for CVE-2022-42703", url: "https://bugzilla.suse.com/1206463", }, { category: "external", summary: "SUSE Bug 1208044 for CVE-2022-42703", url: "https://bugzilla.suse.com/1208044", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42703", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-42703", }, { cve: "CVE-2022-42719", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42719", }, ], notes: [ { category: "general", text: "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42719", url: "https://www.suse.com/security/cve/CVE-2022-42719", }, { category: "external", summary: "SUSE Bug 1204051 for CVE-2022-42719", url: "https://bugzilla.suse.com/1204051", }, { category: "external", summary: "SUSE Bug 1204292 for CVE-2022-42719", url: "https://bugzilla.suse.com/1204292", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42719", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-42719", }, { cve: "CVE-2022-42720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42720", }, ], notes: [ { category: "general", text: "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42720", url: "https://www.suse.com/security/cve/CVE-2022-42720", }, { category: "external", summary: "SUSE Bug 1204059 for CVE-2022-42720", url: "https://bugzilla.suse.com/1204059", }, { category: "external", summary: "SUSE Bug 1204291 for CVE-2022-42720", url: "https://bugzilla.suse.com/1204291", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42720", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-42720", }, { cve: "CVE-2022-42721", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42721", }, ], notes: [ { category: "general", text: "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42721", url: "https://www.suse.com/security/cve/CVE-2022-42721", }, { category: "external", summary: "SUSE Bug 1204060 for CVE-2022-42721", url: "https://bugzilla.suse.com/1204060", }, { category: "external", summary: "SUSE Bug 1204290 for CVE-2022-42721", url: "https://bugzilla.suse.com/1204290", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42721", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-42721", }, { cve: "CVE-2022-42722", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42722", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42722", url: "https://www.suse.com/security/cve/CVE-2022-42722", }, { category: "external", summary: "SUSE Bug 1204125 for CVE-2022-42722", url: "https://bugzilla.suse.com/1204125", }, { category: "external", summary: "SUSE Bug 1204289 for CVE-2022-42722", url: "https://bugzilla.suse.com/1204289", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42722", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-42722", }, { cve: "CVE-2022-42895", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42895", }, ], notes: [ { category: "general", text: "There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42895", url: "https://www.suse.com/security/cve/CVE-2022-42895", }, { category: "external", summary: "SUSE Bug 1205705 for CVE-2022-42895", url: "https://bugzilla.suse.com/1205705", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-42895", }, { cve: "CVE-2022-42896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42896", }, ], notes: [ { category: "general", text: "There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42896", url: "https://www.suse.com/security/cve/CVE-2022-42896", }, { category: "external", summary: "SUSE Bug 1205709 for CVE-2022-42896", url: "https://bugzilla.suse.com/1205709", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-42896", }, { cve: "CVE-2022-43750", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-43750", }, ], notes: [ { category: "general", text: "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-43750", url: "https://www.suse.com/security/cve/CVE-2022-43750", }, { category: "external", summary: "SUSE Bug 1204653 for CVE-2022-43750", url: "https://bugzilla.suse.com/1204653", }, { category: "external", summary: "SUSE Bug 1211484 for CVE-2022-43750", url: "https://bugzilla.suse.com/1211484", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-43750", }, { cve: "CVE-2022-4378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-4378", }, ], notes: [ { category: "general", text: "A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-4378", url: "https://www.suse.com/security/cve/CVE-2022-4378", }, { category: "external", summary: "SUSE Bug 1206207 for CVE-2022-4378", url: "https://bugzilla.suse.com/1206207", }, { category: "external", summary: "SUSE Bug 1206228 for CVE-2022-4378", url: "https://bugzilla.suse.com/1206228", }, { category: "external", summary: "SUSE Bug 1208030 for CVE-2022-4378", url: "https://bugzilla.suse.com/1208030", }, { category: "external", summary: "SUSE Bug 1208085 for CVE-2022-4378", url: "https://bugzilla.suse.com/1208085", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-4378", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1211118 for CVE-2022-4378", url: "https://bugzilla.suse.com/1211118", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2022-4378", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218483 for CVE-2022-4378", url: "https://bugzilla.suse.com/1218483", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2022-4378", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-4378", }, { cve: "CVE-2022-43945", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-43945", }, ], notes: [ { category: "general", text: "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-43945", url: "https://www.suse.com/security/cve/CVE-2022-43945", }, { category: "external", summary: "SUSE Bug 1205128 for CVE-2022-43945", url: "https://bugzilla.suse.com/1205128", }, { category: "external", summary: "SUSE Bug 1205130 for CVE-2022-43945", url: "https://bugzilla.suse.com/1205130", }, { category: "external", summary: "SUSE Bug 1208030 for CVE-2022-43945", url: "https://bugzilla.suse.com/1208030", }, { category: "external", summary: "SUSE Bug 1208085 for CVE-2022-43945", url: "https://bugzilla.suse.com/1208085", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-43945", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1210124 for CVE-2022-43945", url: "https://bugzilla.suse.com/1210124", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "important", }, ], title: "CVE-2022-43945", }, { cve: "CVE-2022-45869", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45869", }, ], notes: [ { category: "general", text: "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45869", url: "https://www.suse.com/security/cve/CVE-2022-45869", }, { category: "external", summary: "SUSE Bug 1205882 for CVE-2022-45869", url: "https://bugzilla.suse.com/1205882", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-45869", }, { cve: "CVE-2022-45888", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45888", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45888", url: "https://www.suse.com/security/cve/CVE-2022-45888", }, { category: "external", summary: "SUSE Bug 1205764 for CVE-2022-45888", url: "https://bugzilla.suse.com/1205764", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "low", }, ], title: "CVE-2022-45888", }, { cve: "CVE-2022-45934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45934", url: "https://www.suse.com/security/cve/CVE-2022-45934", }, { category: "external", summary: "SUSE Bug 1205796 for CVE-2022-45934", url: "https://bugzilla.suse.com/1205796", }, { category: "external", summary: "SUSE Bug 1212292 for CVE-2022-45934", url: "https://bugzilla.suse.com/1212292", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_5-rt-1-150400.1.3.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.5.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.5.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-12-23T10:39:17Z", details: "moderate", }, ], title: "CVE-2022-45934", }, ], }
suse-su-2022:3609-1
Vulnerability from csaf_suse
Published
2022-10-18 09:44
Modified
2022-10-18 09:44
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).
- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).
- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).
- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).
- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).
- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).
- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).
- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).
- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).
- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).
- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).
- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).
- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).
- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).
- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).
- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).
- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).
- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).
- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).
- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).
- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).
- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).
- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).
- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).
- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bnc#1177471)
The following non-security bugs were fixed:
- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).
- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).
- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).
- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).
- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).
- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).
- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).
- ACPI: video: Force backlight native for some TongFang devices (git-fixes).
- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).
- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).
- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).
- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).
- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).
- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).
- ALSA: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).
- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo L140PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).
- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).
- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).
- ALSA: hda/realtek: Fix deadlock by COEF mutex (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).
- ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).
- ALSA: info: Fix llseek return value when using callback (git-fixes).
- ALSA: seq: Fix data-race at module auto-loading (git-fixes).
- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).
- ALSA: usb-audio: fix spelling mistakes (git-fixes).
- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).
- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).
- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).
- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).
- ARM: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).
- ARM: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).
- ARM: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).
- ARM: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).
- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)
- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)
- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)
- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)
- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)
- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes)
- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)
- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)
- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).
- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)
- arm64: mm: fix p?d_leaf() (git-fixes)
- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)
- arm64: mm: Validate hotplug range before creating linear mapping (git-fixes)
- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).
- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)
- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)
- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)
- asm-generic: sections: refactor memory_intersects (git-fixes).
- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).
- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).
- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).
- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).
- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).
- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).
- ASoC: tas2770: Allow mono streams (git-fixes).
- ata: libata-eh: Add missing command name (git-fixes).
- ath10k: do not enforce interrupt trigger type (git-fixes).
- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).
- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).
- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).
- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).
- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).
- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).
- blktrace: fix blk_rq_merge documentation (git-fixes).
- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).
- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).
- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).
- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).
- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).
- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).
- can: Break loopback loop on loopback documentation (git-fixes).
- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).
- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).
- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).
- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).
- can: m_can: process interrupt only when not runtime suspended (git-fixes).
- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).
- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).
- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).
- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).
- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).
- ceph: do not truncate file in atomic_open (bsc#1202811).
- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).
- cgroup: Trace event cgroup id fields should be u64 (git-fixes).
- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).
- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).
- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).
- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).
- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).
- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).
- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).
- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).
- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).
- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).
- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).
- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).
- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).
- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).
- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)
- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)
- devlink: Fix use-after-free after a failed reload (git-fixes).
- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).
- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).
- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).
- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).
- driver core: fix potential deadlock in __driver_attach (git-fixes).
- drm: adv7511: override i2c address of cec before accessing it (git-fixes).
- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).
- drm: bridge: sii8620: fix possible off-by-one (git-fixes).
- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).
- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).
- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).
- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).
- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).
- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).
- drm/doc: Fix comment typo (git-fixes).
- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).
- drm/gem: Fix GEM handle release errors (git-fixes).
- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).
- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).
- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).
- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).
- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).
- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).
- drm/mediatek: dpi: Remove output format of YUV (git-fixes).
- drm/meson: Correct OSD1 global alpha value (git-fixes).
- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).
- drm/meson: Fix overflow implicit truncation warnings (git-fixes).
- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).
- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).
- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).
- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).
- drm/msm/dsi: fix the inconsistent indenting (git-fixes).
- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).
- drm/msm/mdp5: Fix global state lock backoff (git-fixes).
- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).
- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).
- drm/radeon: add a force flush to delay work when radeon (git-fixes).
- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).
- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).
- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).
- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).
- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).
- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).
- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).
- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).
- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).
- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).
- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).
- drm/vc4: plane: Remove subpixel positioning check (git-fixes).
- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).
- ehea: fix error return code in ehea_restart_qps() (git-fixes).
- enetc: Fix endianness issues for enetc_qos (git-fixes).
- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).
- ext4: add reserved GDT blocks check (bsc#1202712).
- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: fix bug_on in ext4_writepages (bsc#1200872).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).
- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).
- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).
- ext4: fix race when reusing xattr blocks (bsc#1198971).
- ext4: fix symlink file size not match to file content (bsc#1200868).
- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).
- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).
- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).
- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).
- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).
- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).
- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).
- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).
- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).
- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).
- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).
- Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).
- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).
- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).
- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).
- fuse: ioctl: translate ENOSYS (bsc#1203136).
- fuse: limit nsec (bsc#1203135).
- fuse: Remove the control interface for virtio-fs (bsc#1203137).
- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).
- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).
- geneve: fix TOS inheriting for ipv4 (git-fixes).
- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).
- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).
- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).
- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).
- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).
- HID: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).
- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).
- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).
- HID: wacom: Do not register pad_input for touch switch (git-fixes).
- HID: wacom: Only report rotation for art pen (git-fixes).
- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).
- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).
- i2c: cadence: Support PEC for SMBus block read (git-fixes).
- i2c: Fix a potential use after free (git-fixes).
- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).
- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).
- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).
- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).
- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).
- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).
- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).
- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).
- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).
- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).
- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).
- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).
- iio: adc: mcp3911: make use of the sign bit (git-fixes).
- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).
- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).
- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).
- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).
- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).
- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).
- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).
- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).
- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).
- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).
- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).
- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).
- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).
- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).
- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).
- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).
- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).
- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).
- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).
- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).
- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).
- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).
- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).
- Input: rk805-pwrkey - fix module autoloading (git-fixes).
- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).
- intel_th: Fix a resource leak in an error handling path (git-fixes).
- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).
- intel_th: msu: Fix vmalloced buffers (git-fixes).
- intel_th: pci: Add Meteor Lake-P support (git-fixes).
- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).
- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).
- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).
- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).
- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).
- iommu/iova: Improve 32-bit free space estimate (git-fixes).
- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).
- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).
- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).
- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).
- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).
- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).
- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).
- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
- ipmi: ssif: initialize ssif_info->client early (git-fixes).
- ixgbevf: add correct exception tracing for XDP (git-fixes).
- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).
- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).
- jfs: fix GPF in diFree (bsc#1203389).
- JFS: fix memleak in jfs_mount (git-fixes).
- JFS: more checks for invalid superblock (git-fixes).
- jfs: prevent NULL deref in diFree (bsc#1203389).
- kABI: cgroup: Restore KABI of css_set (bsc#1201610).
- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).
- kabi/severities: add stmmac driver local sumbols
- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).
- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).
- kexec: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: drop weak attribute from functions (bsc#1196444).
- kexec: KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).
- kexec: KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).
- kfifo: fix kfifo_to_user() return type (git-fixes).
- kfifo: fix ternary sign extension bugs (git-fixes).
- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)
- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).
- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).
- KVM: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).
- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).
- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).
- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).
- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).
- KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).
- KVM: x86: accept userspace interrupt only if no event is injected (git-fixes).
- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).
- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).
- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).
- lib/list_debug.c: Detect uninitialized lists (git-fixes).
- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).
- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).
- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).
- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).
- mbcache: add functions to delete entry if unused (bsc#1198971).
- mbcache: do not reclaim used entries (bsc#1198971).
- md-raid10: fix KASAN warning (git-fixes).
- md: call __md_stop_writes in md_stop (git-fixes).
- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).
- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).
- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).
- media: rc: increase rc-mm tolerance and add debug message (git-fixes).
- media: rtl28xxu: add missing sleep before probing slave demod (git-fixes).
- media: rtl28xxu: Add support for PROlectrix DV107669 DVB-T dongle (git-fixes).
- media: rtl28xxu: set keymap for Astrometa DVB-T2 (git-fixes).
- media: smipcie: fix interrupt handling and IR timeout (git-fixes).
- media: tw686x: Register the irq at the end of probe (git-fixes).
- media: usb: dvb-usb-v2: rtl28xxu: convert to use i2c_new_client_device() (git-fixes).
- media: v4l2-mem2mem: always consider OUTPUT queue during poll (git-fixes).
- media: v4l2-mem2mem: reorder checks in v4l2_m2m_poll() (git-fixes).
- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).
- memstick/ms_block: Fix a memory leak (git-fixes).
- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).
- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).
- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).
- mfd: t7l66xb: Drop platform disable callback (git-fixes).
- misc: fastrpc: fix memory corruption on open (git-fixes).
- misc: fastrpc: fix memory corruption on probe (git-fixes).
- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: fix page reference leak in soft_offline_page() (git fixes (mm/memory-failure)).
- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).
- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).
- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).
- mm: rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).
- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).
- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).
- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).
- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).
- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).
- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).
- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).
- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).
- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).
- mt7601u: add USB device ID for some versions of XiaoDu WiFi Dongle (git-fixes).
- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).
- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).
- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).
- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).
- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).
- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).
- net_sched: cls_route: disallow handle of 0 (bsc#1202393).
- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).
- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).
- net: cpsw: Properly initialise struct page_pool_params (git-fixes).
- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).
- net: dsa: b53: fix an off by one in checking 'vlan->vid' (git-fixes).
- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).
- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).
- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).
- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).
- net: enetc: Use pci_release_region() to release some resources (git-fixes).
- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).
- net: ethernet: ezchip: fix error handling (git-fixes).
- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).
- net: ethernet: ezchip: remove redundant check (git-fixes).
- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).
- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).
- net: fec_ptp: add clock rate zero check (git-fixes).
- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).
- net: ftgmac100: Fix crash when removing driver (git-fixes).
- net: hdlc_x25: Return meaningful error code in x25_open (git-fixes).
- net: hns: Fix kernel-doc (git-fixes).
- net: lantiq: fix memory corruption in RX ring (git-fixes).
- net: lapbether: Prevent racing when checking whether the netif is running (git-fixes).
- net: mana: Add rmb after checking owner bits (git-fixes).
- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).
- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).
- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).
- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).
- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).
- net: mvpp2: fix interrupt mask/unmask skip condition (git-fixes).
- net: netcp: Fix an error message (git-fixes).
- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).
- net: rose: fix netdev reference changes (git-fixes).
- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).
- net: stmicro: handle clk_prepare() failure during init (git-fixes).
- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).
- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).
- net: stmmac: Modify configuration method of EEE timers (git-fixes).
- net: stmmac: Use resolved link config in mac_link_up() (git-fixes).
- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).
- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).
- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).
- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).
- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).
- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).
- net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' (git-fixes).
- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFS: Fix races in the legacy idmapper upcall (git-fixes).
- NFS: Fix second deadlock in nfs4_evict_inode() (git-fixes).
- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).
- NFS: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).
- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).
- NFS: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSD: Clamp WRITE offsets (git-fixes).
- NFSD: Fix offset type in I/O trace points (git-fixes).
- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).
- NFSD: fix use-after-free due to delegation race (git-fixes).
- NFSD: prevent integer overflow on 32 bit systems (git-fixes).
- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).
- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).
- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).
- nvme-rdma: Handle number of queue changes (bsc#1201865).
- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).
- nvme-tcp: Handle number of queue changes (bsc#1201865).
- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).
- nvmet: Expose max queues to configfs (bsc#1201865).
- objtool: Add support for intra-function calls (bsc#1202396).
- objtool: Make handle_insn_ops() unconditional (bsc#1202396).
- objtool: Remove INSN_STACK (bsc#1202396).
- objtool: Rework allocating stack_ops on decode (bsc#1202396).
- objtool: Support multiple stack_op per instruction (bsc#1202396).
- ocfs2: drop acl cache for directories too (bsc#1191667).
- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).
- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).
- octeontx2-af: fix infinite loop in unmapping NPC counter (git-fixes).
- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).
- of/device: Fix up of_dma_configure_id() stub (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).
- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).
- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).
- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).
- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).
- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).
- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).
- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).
- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- PCI: qcom: Fix pipe clock imbalance (git-fixes).
- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).
- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).
- PCI: tegra194: Fix link up retry sequence (git-fixes).
- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).
- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).
- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).
- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).
- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).
- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).
- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).
- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).
- pinctrl/rockchip: fix gpio device creation (git-fixes).
- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).
- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).
- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).
- PM: runtime: Remove link state checks in rpm_get/put_supplier() (git-fixes).
- powerpc: define get_cycles macro for arch-override (bsc#1065729).
- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).
- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).
- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).
- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).
- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).
- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).
- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).
- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).
- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).
- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).
- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).
- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).
- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).
- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
- profiling: fix shift too large makes kernel panic (git-fixes).
- profiling: fix shift-out-of-bounds bugs (git fixes).
- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).
- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).
- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).
- random: remove useless header comment (git fixes).
- ratelimit: Fix data-races in ___ratelimit() (git-fixes).
- regulator: core: Clean up on enable failure (git-fixes).
- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).
- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).
- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).
- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).
- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).
- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).
- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).
- s390/mm: fix 2KB pgtable release race (git-fixes).
- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).
- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).
- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).
- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).
- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).
- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).
- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).
- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).
- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)
- sched/fair: Revise comment about lb decision matrix (git fixes (sched/fair)).
- sched/membarrier: fix missing local execution of ipi_sync_rq_state() (git fixes (sched/membarrier)).
- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).
- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).
- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).
- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).
- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).
- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).
- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).
- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).
- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).
- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).
- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).
- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).
- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).
- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).
- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).
- scsi: lpfc: Remove SANDiags related code (bsc#1203063).
- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).
- scsi: lpfc: Remove unneeded result variable (bsc#1203939).
- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).
- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).
- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).
- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).
- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).
- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).
- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).
- scsi: mpt3sas: Fix use-after-free warning (git-fixes).
- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).
- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).
- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).
- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).
- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).
- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).
- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).
- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).
- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).
- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).
- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).
- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).
- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).
- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).
- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).
- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).
- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).
- scsi: smartpqi: Update LUN reset handler (bsc#1200622).
- selftests: futex: Use variable MAKE instead of make (git-fixes).
- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).
- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).
- serial: mvebu-uart: uart2 error bits clearing (git-fixes).
- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).
- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).
- soc: fsl: guts: machine variable might be unset (git-fixes).
- soundwire: bus_type: fix remove and shutdown support (git-fixes).
- spi: Fix incorrect cs_setup delay handling (git-fixes).
- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).
- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).
- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).
- squashfs: fix divide error in calculate_skip() (git-fixes).
- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).
- staging: rtl8712: fix use after free bugs (git-fixes).
- SUNRPC reverting d03727b248d0 ('NFSv4 fix CLOSE not waiting for direct IO compeletion') (git-fixes).
- SUNRPC: Clean up scheduling of autoclose (git-fixes).
- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).
- SUNRPC: Do not dereference xprt->snd_task if it's a cookie (git-fixes).
- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).
- SUNRPC: fix expiry of auth creds (git-fixes).
- SUNRPC: Fix misplaced barrier in call_decode (git-fixes).
- SUNRPC: Fix READ_PLUS crasher (git-fixes).
- SUNRPC: Partial revert of commit 6f9f17287e78 (git-fixes).
- SUNRPC: Prevent immediate close+reconnect (git-fixes).
- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).
- SUNRPC: RPC level errors should set task->tk_rpc_status (git-fixes).
- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).
- tee: optee: Fix incorrect page free bug (git-fixes).
- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).
- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).
- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).
- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).
- tick/nohz: Use WARN_ON_ONCE() to prevent console saturation (git fixes (kernel/time)).
- tools/thermal: Fix possible path truncations (git-fixes).
- tracing: Add ustring operation to filtering string pointers (git-fixes).
- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).
- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).
- tracing/histograms: Fix memory leak problem (git-fixes).
- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).
- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).
- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).
- tty: vt: initialize unicode screen buffer (git-fixes).
- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).
- USB: core: Fix RST error in hub.c (git-fixes).
- USB: core: Prevent nested device-reset calls (git-fixes).
- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).
- USB: dwc3: add cancelled reasons for dwc3 requests (git-fixes).
- USB: dwc3: disable USB core PHY management (git-fixes).
- USB: dwc3: ep0: Fix delay status handling (git-fixes).
- USB: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).
- USB: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).
- USB: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).
- USB: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).
- USB: dwc3: gadget: Remove unnecessary checks (git-fixes).
- USB: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).
- USB: dwc3: gadget: Store resource index of start cmd (git-fixes).
- USB: dwc3: qcom: fix missing optional irq warnings.
- USB: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).
- USB: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).
- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).
- USB: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).
- USB: gadget: u_audio: fix race condition on endpoint stop (git-fixes).
- USB: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- USB: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).
- USB: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).
- USB: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).
- USB: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).
- USB: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).
- USB: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).
- USB: otg-fsm: Fix hrtimer list corruption (git-fixes).
- USB: renesas: Fix refcount leak bug (git-fixes).
- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).
- USB: serial: ch341: fix lost character on LCR updates (git-fixes).
- USB: serial: ch341: name prescaler, divisor registers (git-fixes).
- USB: serial: cp210x: add Decagon UCA device id (git-fixes).
- USB: serial: fix tty-port initialized comments (git-fixes).
- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).
- USB: serial: option: add Quectel EM060K modem (git-fixes).
- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).
- USB: serial: option: add support for OPPO R11 diag port (git-fixes).
- USB: storage: Add ASUS <0x0b05:0x1932> to IGNORE_UAS (git-fixes).
- USB: storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).
- USB: struct usb_device: hide new member (git-fixes).
- USB: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).
- USB: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).
- USB: xhci: tegra: Fix error check (git-fixes).
- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).
- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).
- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).
- vboxguest: Do not use devm for irq (git-fixes).
- vfio/ccw: Remove UUID from s390 debug log (git-fixes).
- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).
- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).
- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).
- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).
- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).
- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).
- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).
- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).
- virtio-net: fix the race between refill work and close (git-fixes).
- VMCI: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).
- VMCI: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).
- VMCI: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).
- VMCI: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).
- VMCI: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).
- VMCI: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).
- vmxnet3: add command to set ring buffer sizes (bsc#1200431).
- vmxnet3: add support for capability registers (bsc#1200431).
- vmxnet3: add support for large passthrough BAR register (bsc#1200431).
- vmxnet3: add support for out of order rx completion (bsc#1200431).
- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).
- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).
- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).
- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).
- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).
- vmxnet3: prepare for version 7 changes (bsc#1200431).
- vmxnet3: Record queue number to incoming packets (bsc#1200431).
- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).
- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).
- vmxnet3: update to version 7 (bsc#1200431).
- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).
- vsock: Fix memory leak in vsock_connect() (git-fixes).
- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).
- vt: Clear selection before changing the font (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).
- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).
- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).
- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).
- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).
- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).
- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).
- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).
- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).
- wifi: p54: add missing parentheses in p54_flush() (git-fixes).
- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).
- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).
- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).
- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).
- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.
- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).
- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).
- x86/xen: Remove undefined behavior in setup_features() (git-fixes).
- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).
- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).
- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).
- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).
- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).
- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).
- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).
- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).
- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).
- xprtrdma: Fix cwnd update ordering (git-fixes).
- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).
Patchnames
SUSE-2022-3609,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3609,openSUSE-SLE-15.3-2022-3609
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39190: Fixed an issue that was discovered in net/netfilter/nf_tables_api.c and could cause a denial of service upon binding to an already bound chain (bnc#1203117).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2022-3303: Fixed a race condition in the sound subsystem due to improper locking (bnc#1203769).\n- CVE-2022-41218: Fixed an use-after-free caused by refcount races in drivers/media/dvb-core/dmxdev.c (bnc#1202960).\n- CVE-2022-3239: Fixed an use-after-free in the video4linux driver that could lead a local user to able to crash the system or escalate their privileges (bnc#1203552).\n- CVE-2022-41848: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl (bnc#1203987).\n- CVE-2022-41849: Fixed a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open (bnc#1203992).\n- CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bnc#1202095).\n- CVE-2022-41222: Fixed a use-after-free via a stale TLB because an rmap lock is not held during a PUD move (bnc#1203622).\n- CVE-2022-2503: Fixed a bug in dm-verity, device-mapper table reloads allowed users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allowed root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates (bnc#1202677).\n- CVE-2020-16119: Fixed a use-after-free vulnerability exploitable by a local attacker due to reuse of a DCCP socket. (bnc#1177471)\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Better fix to avoid spamming the console with old error logs (git-fixes).\n- ACPI: CPPC: Do not prevent CPPC from working in the future (git-fixes).\n- ACPI: EC: Remove duplicate ThinkPad X1 Carbon 6th entry from DMI quirks (git-fixes).\n- ACPI: LPSS: Fix missing check in register_device_clock() (git-fixes).\n- ACPI: PM: save NVS memory for Lenovo G40-45 (git-fixes).\n- ACPI: processor: Remove freq Qos request for all CPUs (git-fixes).\n- ACPI: property: Return type of acpi_add_nondev_subnodes() should be bool (git-fixes).\n- ACPI: video: Force backlight native for some TongFang devices (git-fixes).\n- ACPI: video: Shortening quirk list by identifying Clevo by board_name only (git-fixes).\n- ALSA: aloop: Fix random zeros in capture data when using jiffies timer (git-fixes).\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing (git-fixes).\n- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (git-fixes).\n- ALSA: hda/cirrus - support for iMac 12,1 model (git-fixes).\n- ALSA: hda/conexant: Add quirk for LENOVO 20149 Notebook model (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP OMEN 15 (8786) mute LED (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- ALSA: hda/realtek: Add new alc285-hp-amp-init model (git-fixes).\n- ALSA: hda/realtek: Add quirk for another Asus K42JZ model (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo L140PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NV45PZ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Spectre x360 15-eb0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- ALSA: hda/realtek: Fix deadlock by COEF mutex (git-fixes).\n- ALSA: hda/realtek: Fix headset mic for Acer SF313-51 (git-fixes).\n- ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: Re-arrange quirk table entries (git-fixes).\n- ALSA: info: Fix llseek return value when using callback (git-fixes).\n- ALSA: seq: Fix data-race at module auto-loading (git-fixes).\n- ALSA: seq: oss: Fix data-race for max_midi_devs access (git-fixes).\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() (git-fixes).\n- ALSA: usb-audio: fix spelling mistakes (git-fixes).\n- ALSA: usb-audio: Inform the delayed registration more properly (git-fixes).\n- ALSA: usb-audio: More comprehensive mixer map for ASUS ROG Zenith II (git-fixes).\n- ALSA: usb-audio: Register card again for iface over delayed_register option (git-fixes).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (git-fixes).\n- ARM: 9077/1: PLT: Move struct plt_entries definition to header (git-fixes).\n- ARM: 9078/1: Add warn suppress parameter to arm_gen_branch_link() (git-fixes).\n- ARM: 9079/1: ftrace: Add MODULE_PLTS support (git-fixes).\n- ARM: 9098/1: ftrace: MODULE_PLT: Fix build problem without DYNAMIC_FTRACE (git-fixes).\n- arm64: cpufeature: Allow different PMU versions in ID_DFR0_EL1 (git-fixes)\n- arm64: dts: allwinner: A64 Sopine: phy-mode rgmii-id (git-fixes)\n- arm64: dts: allwinner: a64-sopine-baseboard: change RGMII mode to (bsc#1202341)\n- arm64: dts: allwinner: H5: NanoPi Neo Plus2: phy-mode rgmii-id (git-fixes)\n- arm64: dts: rockchip: Pull up wlan wake# on Gru-Bob (git-fixes)\n- arm64: dts: rockchip: Remove 'enable-active-low' from rk3399-puma (git-fixes)\n- arm64: dts: rockchip: Set RK3399-Gru PCLK_EDP to 24 MHz (git-fixes)\n- arm64: dts: uniphier: Fix USB interrupts for PXs3 SoC (git-fixes)\n- arm64: kexec_file: use more system keyrings to verify kernel image signature (bsc#1196444).\n- arm64: mm: Always update TCR_EL1 from __cpu_set_tcr_t0sz() (git-fixes)\n- arm64: mm: fix p?d_leaf() (git-fixes)\n- arm64: mm: use a 48-bit ID map when possible on 52-bit VA builds (git-fixes)\n- arm64: mm: Validate hotplug range before creating linear mapping (git-fixes)\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: tegra: Fix SDMMC1 CD on P2888 (git-fixes)\n- arm64: tegra: Remove non existent Tegra194 reset (git-fixes)\n- arm64: tlb: fix the TTL value of tlb_get_level (git-fixes)\n- asm-generic: sections: refactor memory_intersects (git-fixes).\n- ASoC: audio-graph-card: Add of_node_put() in fail path (git-fixes).\n- ASoC: codecs: da7210: add check for i2c_add_driver (git-fixes).\n- ASoC: codecs: msm8916-wcd-digital: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: codecs: wcd9335: move gains from SX_TLV to S8_TLV (git-fixes).\n- ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe (git-fixes).\n- ASoC: qcom: q6dsp: Fix an off-by-one in q6adm_alloc_copp() (git-fixes).\n- ASoC: SOF: debug: Fix potential buffer overflow by snprintf() (git-fixes).\n- ASoC: tas2770: Allow mono streams (git-fixes).\n- ata: libata-eh: Add missing command name (git-fixes).\n- ath10k: do not enforce interrupt trigger type (git-fixes).\n- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).\n- atm: idt77252: fix use-after-free bugs caused by tst_timer (git-fixes).\n- blk-iocost: clamp inuse and skip noops in __propagate_weights() (bsc#1202722).\n- blk-iocost: fix operation ordering in iocg_wake_fn() (bsc#1202720).\n- blk-iocost: fix weight updates of inner active iocgs (bsc#1202717).\n- blk-iocost: rename propagate_active_weights() to propagate_weights() (bsc#1202722).\n- blktrace: fix blk_rq_merge documentation (git-fixes).\n- Bluetooth: hci_intel: Add check for platform_driver_register (git-fixes).\n- Bluetooth: L2CAP: Fix build errors in some archs (git-fixes).\n- Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm regression (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put (git-fixes).\n- Bluetooth: MGMT: Fixes build warnings with C=1 (git-fixes).\n- bpf: Compile out btf_parse_module() if module BTF is not enabled (git-fixes).\n- bus: hisi_lpc: fix missing platform_device_put() in hisi_lpc_acpi_probe() (git-fixes).\n- can: Break loopback loop on loopback documentation (git-fixes).\n- can: ems_usb: fix clang's -Wunaligned-access warning (git-fixes).\n- can: error: specify the values of data[5..7] of CAN error frames (git-fixes).\n- can: hi311x: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_hydra: do not report txerr and rxerr during bus-off (git-fixes).\n- can: kvaser_usb_leaf: do not report txerr and rxerr during bus-off (git-fixes).\n- can: m_can: process interrupt only when not runtime suspended (git-fixes).\n- can: pch_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: pch_can: pch_can_error(): initialize errc before using it (git-fixes).\n- can: rcar_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sja1000: do not report txerr and rxerr during bus-off (git-fixes).\n- can: sun4i_can: do not report txerr and rxerr during bus-off (git-fixes).\n- can: usb_8dev: do not report txerr and rxerr during bus-off (git-fixes).\n- ceph: do not leak snap_rwsem in handle_cap_grant (bsc#1202810).\n- ceph: do not truncate file in atomic_open (bsc#1202811).\n- cgroup: cgroup_get_from_id() must check the looked-up kn is a directory (bsc#1203906).\n- cgroup: Trace event cgroup id fields should be u64 (git-fixes).\n- cgroup: Use separate src/dst nodes when preloading css_sets for migration (bsc#1201610).\n- clk: bcm: rpi: Fix error handling of raspberrypi_fw_get_rate (git-fixes).\n- clk: core: Fix runtime PM sequence in clk_core_unprepare() (git-fixes).\n- clk: core: Honor CLK_OPS_PARENT_ENABLE for clk gate ops (git-fixes).\n- clk: qcom: camcc-sdm845: Fix topology around titan_top power domain (git-fixes).\n- clk: qcom: clk-krait: unlock spin after mux completion (git-fixes).\n- clk: qcom: ipq8074: dont disable gcc_sleep_clk_src (git-fixes).\n- clk: qcom: ipq8074: fix NSS core PLL-s (git-fixes).\n- clk: qcom: ipq8074: fix NSS port frequency tables (git-fixes).\n- clk: qcom: ipq8074: set BRANCH_HALT_DELAY flag for UBI clocks (git-fixes).\n- clk: qcom: ipq8074: SW workaround for UBI32 PLL lock (git-fixes).\n- clk: renesas: r9a06g032: Fix UART clkgrp bitsel (git-fixes).\n- clk: rockchip: add sclk_mac_lbtest to rk3188_critical_clocks (git-fixes).\n- coresight: cti: Correct the parameter for pm_runtime_put (git-fixes).\n- crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE (git-fixes)\n- crypto: arm64/poly1305 - fix a read out-of-bound (git-fixes)\n- devlink: Fix use-after-free after a failed reload (git-fixes).\n- dm raid: fix KASAN warning in raid5_add_disks (git-fixes).\n- dmaengine: sprd: Cleanup in .remove() after pm_runtime_get_sync() failed (git-fixes).\n- dpaa2-eth: unregister the netdev before disconnecting from the PHY (git-fixes).\n- driver core: Do not probe devices after bus_type.match() probe deferral (git-fixes).\n- driver core: fix potential deadlock in __driver_attach (git-fixes).\n- drm: adv7511: override i2c address of cec before accessing it (git-fixes).\n- drm: bridge: adv7511: Add check for mipi_dsi_driver_register (git-fixes).\n- drm: bridge: sii8620: fix possible off-by-one (git-fixes).\n- drm/amd/display: Enable building new display engine with KCOV enabled (git-fixes).\n- drm/amdgpu: Check BO's requested pinning domains against its preferred_domains (git-fixes).\n- drm/amdgpu: Check num_gfx_rings for gfx v9_0 rb setup (git-fixes).\n- drm/amdgpu: mmVM_L2_CNTL3 register not initialized correctly (git-fixes).\n- drm/amdgpu: remove useless condition in amdgpu_job_stop_all_jobs_on_sched() (git-fixes).\n- drm/bridge: tc358767: Make sure Refclk clock are enabled (git-fixes).\n- drm/doc: Fix comment typo (git-fixes).\n- drm/exynos/exynos7_drm_decon: free resources when clk_set_parent() failed (git-fixes).\n- drm/gem: Fix GEM handle release errors (git-fixes).\n- drm/gem: Properly annotate WW context on drm_gem_lock_reservations() error (git-fixes).\n- drm/i915/glk: ECS Liva Q2 needs GLK HDMI port timing quirk (git-fixes).\n- drm/i915/reg: Fix spelling mistake 'Unsupport' -> 'Unsupported' (git-fixes).\n- drm/mcde: Fix refcount leak in mcde_dsi_bind (git-fixes).\n- drm/mediatek: Add pull-down MIPI operation in mtk_dsi_poweroff function (git-fixes).\n- drm/mediatek: dpi: Only enable dpi after the bridge is enabled (git-fixes).\n- drm/mediatek: dpi: Remove output format of YUV (git-fixes).\n- drm/meson: Correct OSD1 global alpha value (git-fixes).\n- drm/meson: Fix OSD1 RGB to YCbCr coefficient (git-fixes).\n- drm/meson: Fix overflow implicit truncation warnings (git-fixes).\n- drm/meson: Fix refcount bugs in meson_vpu_has_available_connectors() (git-fixes).\n- drm/mipi-dbi: align max_chunk to 2 in spi_transfer (git-fixes).\n- drm/msm/dsi: Fix number of regulators for msm8996_dsi_cfg (git-fixes).\n- drm/msm/dsi: Fix number of regulators for SDM660 (git-fixes).\n- drm/msm/dsi: fix the inconsistent indenting (git-fixes).\n- drm/msm/hdmi: enable core-vcc/core-vdda-supply for 8996 platform (git-fixes).\n- drm/msm/mdp5: Fix global state lock backoff (git-fixes).\n- drm/msm/rd: Fix FIFO-full deadlock (git-fixes).\n- drm/nouveau: fix another off-by-one in nvbios_addr (git-fixes).\n- drm/radeon: add a force flush to delay work when radeon (git-fixes).\n- drm/radeon: fix incorrrect SPDX-License-Identifiers (git-fixes).\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() (git-fixes).\n- drm/rockchip: Fix an error handling path rockchip_dp_probe() (git-fixes).\n- drm/rockchip: vop: Do not crash for invalid duplicate_state() (git-fixes).\n- drm/st7735r: Fix module autoloading for Okaya RH128128T (git-fixes).\n- drm/sun4i: dsi: Prevent underflow when computing packet sizes (git-fixes).\n- drm/vc4: dsi: Add correct stop condition to vc4_dsi_encoder_disable iteration (git-fixes).\n- drm/vc4: dsi: Correct DSI divider calculations (git-fixes).\n- drm/vc4: dsi: Correct pixel order for DSI0 (git-fixes).\n- drm/vc4: hdmi: Correct HDMI timing registers for interlaced modes (git-fixes).\n- drm/vc4: hdmi: Fix timings for interlaced modes (git-fixes).\n- drm/vc4: plane: Fix margin calculations for the right/bottom edges (git-fixes).\n- drm/vc4: plane: Remove subpixel positioning check (git-fixes).\n- efi: capsule-loader: Fix use-after-free in efi_capsule_write (git-fixes).\n- ehea: fix error return code in ehea_restart_qps() (git-fixes).\n- enetc: Fix endianness issues for enetc_qos (git-fixes).\n- ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() (git-fixes).\n- ext4: add reserved GDT blocks check (bsc#1202712).\n- ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() (bsc#1202708).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix loff_t overflow in ext4_max_bitmap_size() (bsc#1202709).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix potential infinite loop in ext4_dx_readdir() (bsc#1191662).\n- ext4: fix race when reusing xattr blocks (bsc#1198971).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: fix use-after-free in ext4_search_dir (bsc#1202710).\n- ext4: fix warning in ext4_handle_inode_extension (bsc#1202711).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: recover csum seed of tmp_inode after migrating to extents (bsc#1202713).\n- ext4: remove EA inode entry from mbcache on inode eviction (bsc#1198971).\n- ext4: unindent codeblock in ext4_xattr_block_set() (bsc#1198971).\n- fbcon: Fix boundary checks for fbcon=vc:n1-n2 parameters (git-fixes).\n- fbdev: chipsfb: Add missing pci_disable_device() in chipsfb_pci_init() (git-fixes).\n- fbdev: fb_pm2fb: Avoid potential divide by zero error (git-fixes).\n- firmware: tegra: bpmp: Do only aligned access to IPC memory area (git-fixes).\n- Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- fpga: altera-pr-ip: fix unsigned comparison with less than zero (git-fixes).\n- fs-writeback: writeback_sb_inodes: Recalculate 'wrote' according skipped pages (bsc#1200873).\n- ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (git-fixes).\n- fuse: ioctl: translate ENOSYS (bsc#1203136).\n- fuse: limit nsec (bsc#1203135).\n- fuse: Remove the control interface for virtio-fs (bsc#1203137).\n- gadgetfs: ep_io - wait until IRQ finishes (git-fixes).\n- geneve: do not use RT_TOS for IPv6 flowlabel (git-fixes).\n- geneve: fix TOS inheriting for ipv4 (git-fixes).\n- gpio: gpiolib-of: Fix refcount bugs in of_mm_gpiochip_add_data() (git-fixes).\n- gpio: mpc8xxx: Fix support for IRQ_TYPE_LEVEL_LOW flow_type in mpc85xx (git-fixes).\n- gpio: pca953x: Add mutex_lock for regcache sync in PM (git-fixes).\n- HID: alps: Declare U1_UNICORN_LEGACY support (git-fixes).\n- HID: cp2112: prevent a buffer overflow in cp2112_xfer() (git-fixes).\n- HID: intel-ish-hid: ishtp: Fix ishtp client sending disordered message (git-fixes).\n- HID: ishtp-hid-clientHID: ishtp-hid-client: Fix comment typo (git-fixes).\n- HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report (git-fixes).\n- HID: wacom: Do not register pad_input for touch switch (git-fixes).\n- HID: wacom: Only report rotation for art pen (git-fixes).\n- hv_netvsc: Load and store the proper (NBL_HASH_INFO) per-packet info (bsc#1202701).\n- hwmon: (gpio-fan) Fix array out of bounds access (git-fixes).\n- i2c: cadence: Support PEC for SMBus block read (git-fixes).\n- i2c: Fix a potential use after free (git-fixes).\n- i2c: imx: Make sure to unregister adapter on remove() (git-fixes).\n- i2c: mux-gpmux: Add of_node_put() when breaking out of loop (git-fixes).\n- ice: report supported and advertised autoneg using PHY capabilities (git-fixes).\n- ieee802154: cc2520: add rc code in cc2520_tx() (git-fixes).\n- ieee802154/adf7242: defer destroy_workqueue call (git-fixes).\n- iio: accel: bma220: Fix alignment for DMA safety (git-fixes).\n- iio: accel: sca3000: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7266: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7298: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7476: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7766: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7768-1: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ad7887: Fix alignment for DMA safety (git-fixes).\n- iio: adc: hi8435: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ltc2497: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1027: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max11100: Fix alignment for DMA safety (git-fixes).\n- iio: adc: max1118: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp320x: Fix alignment for DMA safety (git-fixes).\n- iio: adc: mcp3911: make use of the sign bit (git-fixes).\n- iio: adc: mcp3911: use correct formula for AD conversion (git-fixes).\n- iio: adc: ti-adc0832: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc084s021: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc12138: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc128s052: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-adc161s626: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads124s08: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads7950: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8344: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-ads8688: Fix alignment for DMA safety (git-fixes).\n- iio: adc: ti-tlc4541: Fix alignment for DMA safety (git-fixes).\n- iio: amplifiers: ad8366: Fix alignment for DMA safety (git-fixes).\n- iio: core: Fix IIO_ALIGN and rename as it was not sufficiently large (git-fixes).\n- iio: dac: ad5064: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5360: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5421: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5449: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5504: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5755: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5761: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5764: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad5791: Fix alignment for DMA saftey (git-fixes).\n- iio: dac: ad7303: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ad8801: Fix alignment for DMA safety (git-fixes).\n- iio: dac: mcp4922: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac082s085: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac5571: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7311: Fix alignment for DMA safety (git-fixes).\n- iio: dac: ti-dac7612: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: ad9523: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4350: Fix alignment for DMA safety (git-fixes).\n- iio: frequency: adf4371: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16080: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adis16130: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: adxrs450: Fix alignment for DMA safety (git-fixes).\n- iio: gyro: fxas210002c: Fix alignment for DMA safety (git-fixes).\n- iio: light: isl29028: Fix the warning in isl29028_remove() (git-fixes).\n- iio: potentiometer: ad5272: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: max5481: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp41010: Fix alignment for DMA safety (git-fixes).\n- iio: potentiometer: mcp4131: Fix alignment for DMA safety (git-fixes).\n- iio: proximity: as3935: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s1200: Fix alignment for DMA safety (git-fixes).\n- iio: resolver: ad2s90: Fix alignment for DMA safety (git-fixes).\n- ima: force signature verification when CONFIG_KEXEC_SIG is configured (bsc#1203737).\n- Input: iforce - add support for Boeder Force Feedback Wheel (git-fixes).\n- Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag (git-fixes).\n- Input: melfas_mip4 - fix return value check in mip4_probe() (git-fixes).\n- Input: rk805-pwrkey - fix module autoloading (git-fixes).\n- Input: snvs_pwrkey - fix SNVS_HPVIDR1 register address (git-fixes).\n- intel_th: Fix a resource leak in an error handling path (git-fixes).\n- intel_th: msu-sink: Potential dereference of null pointer (git-fixes).\n- intel_th: msu: Fix vmalloced buffers (git-fixes).\n- intel_th: pci: Add Meteor Lake-P support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S CPU support (git-fixes).\n- intel_th: pci: Add Raptor Lake-S PCH support (git-fixes).\n- iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement (git-fixes).\n- iommu/arm-smmu: qcom_iommu: Add of_node_put() when breaking out of loop (git-fixes).\n- iommu/exynos: Handle failed IOMMU device registration properly (git-fixes).\n- iommu/iova: Improve 32-bit free space estimate (git-fixes).\n- iommu/ipmmu-vmsa: Check for error num after setting mask (git-fixes).\n- iommu/mediatek: Add list_del in mtk_iommu_remove (git-fixes).\n- iommu/msm: Fix an incorrect NULL check on list iterator (git-fixes).\n- iommu/omap: Fix regression in probe for NULL pointer dereference (git-fixes).\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) (git-fixes).\n- iommu/vt-d: Calculate mask for non-aligned flushes (git-fixes).\n- iommu/vt-d: Fix PCI bus rescan device hot add (git-fixes).\n- iommu/vt-d: Fix RID2PASID setup/teardown failure (git-fixes).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: ssif: initialize ssif_info->client early (git-fixes).\n- ixgbevf: add correct exception tracing for XDP (git-fixes).\n- jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted (bsc#1202716).\n- jbd2: fix outstanding credits assert in jbd2_journal_commit_transaction() (bsc#1202715).\n- jfs: fix GPF in diFree (bsc#1203389).\n- JFS: fix memleak in jfs_mount (git-fixes).\n- JFS: more checks for invalid superblock (git-fixes).\n- jfs: prevent NULL deref in diFree (bsc#1203389).\n- kABI: cgroup: Restore KABI of css_set (bsc#1201610).\n- kABI: x86: kexec: hide new include from genksyms (bsc#1196444).\n- kabi/severities: add stmmac driver local sumbols\n- kexec: clean up arch_kexec_kernel_verify_sig (bsc#1196444).\n- kexec: do not verify the signature without the lockdown or mandatory signature (bsc#1203737).\n- kexec: drop weak attribute from arch_kexec_apply_relocations[_add] (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: drop weak attribute from functions (bsc#1196444).\n- kexec: KEYS, s390: Make use of built-in and secondary keyring for signature verification (bsc#1196444).\n- kexec: KEYS: make the code in bzImage64_verify_sig generic (bsc#1196444).\n- kfifo: fix kfifo_to_user() return type (git-fixes).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- KVM: arm64: Avoid setting the upper 32 bits of TCR_EL2 and CPTR_EL2 (bsc#1201442)\n- KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case (git-fixes).\n- KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case (git-fixes).\n- KVM: PPC: Book3S HV: Context tracking exit guest context before enabling irqs (bsc#1065729).\n- KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB (bsc#1156395).\n- KVM: PPC: Book3S HV: Use GLOBAL_TOC for kvmppc_h_set_dabr/xdabr() (bsc#1156395).\n- KVM: PPC: Fix vmx/vsx mixup in mmio emulation (bsc#1156395).\n- KVM: PPC: Use arch_get_random_seed_long instead of powernv variant (bsc#1156395).\n- KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled (git-fixes).\n- KVM: x86: accept userspace interrupt only if no event is injected (git-fixes).\n- KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks (git-fixes).\n- KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP (git-fixes).\n- lib: bitmap: provide devm_bitmap_alloc() and devm_bitmap_zalloc() (git-fixes).\n- lib/list_debug.c: Detect uninitialized lists (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- list: add 'list_del_init_careful()' to go with 'list_empty_careful()' (bsc#1202745).\n- locking/lockdep: Avoid potential access of invalid memory in lock_class (git-fixes).\n- loop: Fix missing discard support when using LOOP_CONFIGURE (bsc#1202718).\n- mbcache: add functions to delete entry if unused (bsc#1198971).\n- mbcache: do not reclaim used entries (bsc#1198971).\n- md-raid10: fix KASAN warning (git-fixes).\n- md: call __md_stop_writes in md_stop (git-fixes).\n- md: unlock mddev before reap sync_thread in action_store (bsc#1197659).\n- md/bitmap: do not set sb values if can't pass sanity check (bsc#1197158).\n- media: hdpvr: fix error value returns in hdpvr_read (git-fixes).\n- media: rc: increase rc-mm tolerance and add debug message (git-fixes).\n- media: rtl28xxu: add missing sleep before probing slave demod (git-fixes).\n- media: rtl28xxu: Add support for PROlectrix DV107669 DVB-T dongle (git-fixes).\n- media: rtl28xxu: set keymap for Astrometa DVB-T2 (git-fixes).\n- media: smipcie: fix interrupt handling and IR timeout (git-fixes).\n- media: tw686x: Register the irq at the end of probe (git-fixes).\n- media: usb: dvb-usb-v2: rtl28xxu: convert to use i2c_new_client_device() (git-fixes).\n- media: v4l2-mem2mem: always consider OUTPUT queue during poll (git-fixes).\n- media: v4l2-mem2mem: reorder checks in v4l2_m2m_poll() (git-fixes).\n- mediatek: mt76: mac80211: Fix missing of_node_put() in mt76_led_init() (git-fixes).\n- memstick/ms_block: Fix a memory leak (git-fixes).\n- memstick/ms_block: Fix some incorrect memory allocation (git-fixes).\n- meson-mx-socinfo: Fix refcount leak in meson_mx_socinfo_init (git-fixes).\n- mfd: max77620: Fix refcount leak in max77620_initialise_fps (git-fixes).\n- mfd: t7l66xb: Drop platform disable callback (git-fixes).\n- misc: fastrpc: fix memory corruption on open (git-fixes).\n- misc: fastrpc: fix memory corruption on probe (git-fixes).\n- misc: rtsx: Fix an error handling path in rtsx_pci_probe() (git-fixes).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: fix page reference leak in soft_offline_page() (git fixes (mm/memory-failure)).\n- mm: memcontrol: fix potential oom_lock recursion deadlock (bsc#1202447).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- mm: proc: smaps_rollup: do not stall write attempts on mmap_lock (bsc#1201990).\n- mm: rmap: Fix anon_vma->degree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: smaps*: extend smap_gather_stats to support specified beginning (bsc#1201990).\n- mmap locking API: add mmap_lock_is_contended() (bsc#1201990).\n- mmc: cavium-octeon: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: cavium-thunderx: Add of_node_put() when breaking out of loop (git-fixes).\n- mmc: pxamci: Fix an error handling path in pxamci_probe() (git-fixes).\n- mmc: pxamci: Fix another error handling path in pxamci_probe() (git-fixes).\n- mmc: sdhci-of-at91: fix set_uhs_signaling rewriting of MC1R (git-fixes).\n- mmc: sdhci-of-esdhc: Fix refcount leak in esdhc_signal_voltage_switch (git-fixes).\n- module: Ignore _GLOBAL_OFFSET_TABLE_ when warning for undefined symbols (git-fixes).\n- mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg (git-fixes).\n- mt7601u: add USB device ID for some versions of XiaoDu WiFi Dongle (git-fixes).\n- mtd: maps: Fix refcount leak in ap_flash_init (git-fixes).\n- mtd: maps: Fix refcount leak in of_flash_probe_versatile (git-fixes).\n- mtd: partitions: Fix refcount leak in parse_redboot_of (git-fixes).\n- mtd: rawnand: meson: Fix a potential double free issue (git-fixes).\n- mtd: sm_ftl: Fix deadlock caused by cancel_work_sync in sm_release (git-fixes).\n- mtd: st_spi_fsm: Add a clk_disable_unprepare() in .probe()'s error path (git-fixes).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- net: bcmgenet: Add mdio-bcm-unimac soft dependency (git-fixes).\n- net: cpsw: add missing of_node_put() in cpsw_probe_dt() (git-fixes).\n- net: cpsw: Properly initialise struct page_pool_params (git-fixes).\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: dsa: b53: fix an off by one in checking 'vlan->vid' (git-fixes).\n- net: dsa: felix: suppress -EPROBE_DEFER errors (git-fixes).\n- net: dsa: mt7530: fix VLAN traffic leaks (git-fixes).\n- net: enetc: report software timestamping via SO_TIMESTAMPING (git-fixes).\n- net: enetc: unmap DMA in enetc_send_cmd() (git-fixes).\n- net: enetc: Use pci_release_region() to release some resources (git-fixes).\n- net: ethernet: aeroflex: fix UAF in greth_of_remove (git-fixes).\n- net: ethernet: ezchip: fix error handling (git-fixes).\n- net: ethernet: ezchip: fix UAF in nps_enet_remove (git-fixes).\n- net: ethernet: ezchip: remove redundant check (git-fixes).\n- net: ethernet: fix potential use-after-free in ec_bhf_remove (git-fixes).\n- net: ethernet: ti: cpsw_ale: Fix access to un-initialized memory (git-fixes).\n- net: fec_ptp: add clock rate zero check (git-fixes).\n- net: fec: fix the potential memory leak in fec_enet_init() (git-fixes).\n- net: ftgmac100: Fix crash when removing driver (git-fixes).\n- net: hdlc_x25: Return meaningful error code in x25_open (git-fixes).\n- net: hns: Fix kernel-doc (git-fixes).\n- net: lantiq: fix memory corruption in RX ring (git-fixes).\n- net: lapbether: Prevent racing when checking whether the netif is running (git-fixes).\n- net: mana: Add rmb after checking owner bits (git-fixes).\n- net: mana: Add support of XDP_REDIRECT action (bug#1201310, jsc#PED-529).\n- net: mana: Add the Linux MANA PF driver (bug#1201309, jsc#PED-529).\n- net: moxa: Use devm_platform_get_and_ioremap_resource() (git-fixes).\n- net: mscc: ocelot: correctly report the timestamping RX filters in ethtool (git-fixes).\n- net: mscc: ocelot: do not downgrade timestamping RX filters in SIOCSHWTSTAMP (git-fixes).\n- net: mvpp2: fix interrupt mask/unmask skip condition (git-fixes).\n- net: netcp: Fix an error message (git-fixes).\n- net: pch_gbe: Propagate error from devm_gpio_request_one() (git-fixes).\n- net: rose: fix netdev reference changes (git-fixes).\n- net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net: stmmac: disable clocks in stmmac_remove_config_dt() (git-fixes).\n- net: stmmac: dwmac1000: Fix extended MAC address registers definition (git-fixes).\n- net: stmmac: Modify configuration method of EEE timers (git-fixes).\n- net: stmmac: Use resolved link config in mac_link_up() (git-fixes).\n- net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() (bsc#1200431).\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() (bsc#1200431).\n- net: vmxnet3: remove multiple false checks in vmxnet3_ethtool.c (bsc#1200431).\n- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- net:enetc: allocate CBD ring data memory using DMA coherent methods (git-fixes).\n- net/mlx5e: Check for needed capability for cvlan matching (git-fixes).\n- net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' (git-fixes).\n- NFS: Do not decrease the value of seq_nr_highest_sent (git-fixes).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFS: Fix races in the legacy idmapper upcall (git-fixes).\n- NFS: Fix second deadlock in nfs4_evict_inode() (git-fixes).\n- NFS: Handle NFS4ERR_DELAY replies to OP_SEQUENCE correctly (git-fixes).\n- NFS: nfs4_proc_set_acl needs to restore NFS_CAP_UIDGID_NOMAP on error (git-fixes).\n- NFS: RECLAIM_COMPLETE must handle EACCES (git-fixes).\n- NFS: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSD: Clamp WRITE offsets (git-fixes).\n- NFSD: Fix offset type in I/O trace points (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFSD: fix use-after-free due to delegation race (git-fixes).\n- NFSD: prevent integer overflow on 32 bit systems (git-fixes).\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NTB: ntb_tool: uninitialized heap data in tool_fn_write() (git-fixes).\n- nvme-fabrics: parse nvme connect Linux error codes (bsc#1201865).\n- nvme-rdma: Handle number of queue changes (bsc#1201865).\n- nvme-tcp: fix UAF when detecting digest errors (bsc#1200313 bsc#1201489).\n- nvme-tcp: Handle number of queue changes (bsc#1201865).\n- nvme: fix RCU hole that allowed for endless looping in multipath round robin (bsc#1202636).\n- nvmet: Expose max queues to configfs (bsc#1201865).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- ocfs2: drop acl cache for directories too (bsc#1191667).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).\n- octeontx2-af: fix infinite loop in unmapping NPC counter (git-fixes).\n- of: fdt: fix off-by-one error in unflatten_dt_nodes() (git-fixes).\n- of/device: Fix up of_dma_configure_id() stub (git-fixes).\n- PCI: Add ACS quirk for Broadcom BCM5750x NICs (git-fixes).\n- PCI: dwc: Add unroll iATU space support to dw_pcie_disable_atu() (git-fixes).\n- PCI: dwc: Always enable CDM check if 'snps,enable-cdm-check' exists (git-fixes).\n- PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors (git-fixes).\n- PCI: dwc: Disable outbound windows only for controllers using iATU (git-fixes).\n- PCI: dwc: Stop link on host_init errors and de-initialization (git-fixes).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Make the code arch neutral by adding arch specific interfaces (bsc#1200845).\n- PCI: hv: Only reuse existing IRTE allocation for Multi-MSI (bsc#1200845).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: qcom: Fix pipe clock imbalance (git-fixes).\n- PCI: qcom: Power on PHY before IPQ8074 DBI register accesses (git-fixes).\n- PCI: qcom: Set up rev 2.1.0 PARF_PHY before enabling clocks (git-fixes).\n- PCI: tegra194: Fix link up retry sequence (git-fixes).\n- PCI: tegra194: Fix PM error handling in tegra_pcie_config_ep() (git-fixes).\n- PCI: tegra194: Fix Root Port interrupt handling (git-fixes).\n- PCI/ACPI: Guard ARM64-specific mcfg_quirks (git-fixes).\n- PCI/portdrv: Do not disable AER reporting in get_port_device_capability() (git-fixes).\n- perf bench: Share some global variables to fix build with gcc 10 (git-fixes).\n- pinctrl: nomadik: Fix refcount leak in nmk_pinctrl_dt_subnode_to_map (git-fixes).\n- pinctrl: qcom: msm8916: Allow CAMSS GP clocks to be muxed (git-fixes).\n- pinctrl: rockchip: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n- pinctrl: sunxi: Add I/O bias setting for H6 R-PIO (git-fixes).\n- pinctrl/rockchip: fix gpio device creation (git-fixes).\n- platform/olpc: Fix uninitialized data in debugfs write (git-fixes).\n- platform/x86: acer-wmi: Acer Aspire One AOD270/Packard Bell Dot keymap fixes (git-fixes).\n- platform/x86: pmc_atom: Fix SLP_TYPx bitfield mask (git-fixes).\n- PM: runtime: Remove link state checks in rpm_get/put_supplier() (git-fixes).\n- powerpc: define get_cycles macro for arch-override (bsc#1065729).\n- powerpc: Enable execve syscall exit tracepoint (bsc#1065729).\n- powerpc: powernv: kABI: add back powernv_get_random_long (bsc#1065729).\n- powerpc/drmem: Make lmb_size 64 bit (bsc#1203424 ltc#199544).\n- powerpc/memhotplug: Make lmb size 64bit (bsc#1203424 ltc#199544).\n- powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable (bsc#1156395).\n- powerpc/powernv: Avoid crashing if rng is NULL (bsc#1065729).\n- powerpc/powernv: delay rng platform device creation until later in boot (bsc#1065729).\n- powerpc/powernv: rename remaining rng powernv_ functions to pnv_ (bsc#1065729).\n- powerpc/powernv: Staticify functions without prototypes (bsc#1065729).\n- powerpc/powernv: wire up rng during setup_arch (bsc#1065729).\n- powerpc/powernv/kvm: Use darn for H_RANDOM on Power9 (bsc#1065729).\n- powerpc/pseries: wire up rng during setup_arch() (bsc#1065729).\n- powerpc/xive: Fix refcount leak in xive_get_max_prio (git-fixess).\n- ppc64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).\n- profiling: fix shift too large makes kernel panic (git-fixes).\n- profiling: fix shift-out-of-bounds bugs (git fixes).\n- psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1203909).\n- qlcnic: Add null check after calling netdev_alloc_skb (git-fixes).\n- random: fix crash on multiple early calls to add_bootloader_randomness() (git-fixes).\n- random: remove useless header comment (git fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- regulator: core: Clean up on enable failure (git-fixes).\n- regulator: of: Fix refcount leak bug in of_get_regulation_constraints() (git-fixes).\n- reiserfs: fix handling of -EOPNOTSUPP in reiserfs_for_each_xattr (bsc#1202714).\n- remoteproc: qcom: q6v5-mss: add powerdomains to MSM8996 config (git-fixes).\n- remoteproc: qcom: wcnss: Fix handling of IRQs (git-fixes).\n- s390/crash: fix incorrect number of bytes to copy to user space (git-fixes).\n- s390/crash: make copy_oldmem_page() return number of bytes copied (git-fixes).\n- s390/mm: do not trigger write fault when vma does not allow VM_WRITE (git-fixes).\n- s390/mm: fix 2KB pgtable release race (git-fixes).\n- s390/ptrace: pass invalid syscall numbers to tracing (bsc#1192594 LTC#197522).\n- s390/qeth: cache link_info for ethtool (bsc#1202984 LTC#199607).\n- s390/qeth: clean up default cases for ethtool link mode (bsc#1202984 LTC#199607).\n- s390/qeth: improve QUERY CARD INFO processing (bsc#1202984 LTC#199607).\n- s390/qeth: improve selection of ethtool link modes (bsc#1202984 LTC#199607).\n- s390/qeth: set static link info during initialization (bsc#1202984 LTC#199607).\n- s390/qeth: tolerate error when querying card info (bsc#1202984 LTC#199607).\n- s390/qeth: use QUERY OAT for initial link info (bsc#1202984 LTC#199607).\n- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)\n- sched/fair: Revise comment about lb decision matrix (git fixes (sched/fair)).\n- sched/membarrier: fix missing local execution of ipi_sync_rq_state() (git fixes (sched/membarrier)).\n- scsi: core: Fix bad pointer dereference when ehandler kthread is invalid (git-fixes).\n- scsi: lpfc: Add missing destroy_workqueue() in error path (bsc#1203939).\n- scsi: lpfc: Add missing free iocb and nlp kref put for early return VMID cases (bsc#1203939).\n- scsi: lpfc: Add reporting capability for Link Degrade Signaling (bsc#1203939).\n- scsi: lpfc: Add warning notification period to CMF_SYNC_WQE (bsc#1203063).\n- scsi: lpfc: Check the return value of alloc_workqueue() (bsc#1203063).\n- scsi: lpfc: Copyright updates for 14.2.0.6 patches (bsc#1203063).\n- scsi: lpfc: Fix FLOGI ACC with wrong SID in PT2PT topology (bsc#1203939).\n- scsi: lpfc: Fix mbuf pool resource detected as busy at driver unload (bsc#1203939).\n- scsi: lpfc: Fix multiple NVMe remoteport registration calls for the same NPort ID (bsc#1203939).\n- scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID (bsc#1203063).\n- scsi: lpfc: Fix prli_fc4_req checks in PRLI handling (bsc#1203939).\n- scsi: lpfc: Fix unsolicited FLOGI receive handling during PT2PT discovery (bsc#1203063).\n- scsi: lpfc: Fix various issues reported by tools (bsc#1203939).\n- scsi: lpfc: Move scsi_host_template outside dynamically allocated/freed phba (bsc#1185032 bsc#1203939).\n- scsi: lpfc: Remove SANDiags related code (bsc#1203063).\n- scsi: lpfc: Remove the unneeded result variable (bsc#1203939).\n- scsi: lpfc: Remove unneeded result variable (bsc#1203939).\n- scsi: lpfc: Rename mp/bmp dma buffers to rq/rsp in lpfc_fdmi_cmd (bsc#1203939).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1203939).\n- scsi: lpfc: Rework FDMI attribute registration for unintential padding (bsc#1203939).\n- scsi: lpfc: Rework lpfc_fdmi_cmd() routine for cleanup and consistency (bsc#1203939).\n- scsi: lpfc: Rework MIB Rx Monitor debug info logic (bsc#1203063).\n- scsi: lpfc: Update congestion mode logging for Emulex SAN Manager application (bsc#1203939).\n- scsi: lpfc: Update lpfc version to 14.2.0.6 (bsc#1203063).\n- scsi: lpfc: Update lpfc version to 14.2.0.7 (bsc#1203939).\n- scsi: mpt3sas: Fix use-after-free warning (git-fixes).\n- scsi: qla2xxx: Add debugfs create/delete helpers (bsc#1203935).\n- scsi: qla2xxx: Add NVMe parameters support in Auxiliary Image Status (bsc#1203935).\n- scsi: qla2xxx: Always wait for qlt_sess_work_fn() from qlt_stop_phase1() (bsc#1203935).\n- scsi: qla2xxx: Avoid flush_scheduled_work() usage (bsc#1203935).\n- scsi: qla2xxx: Disable ATIO interrupt coalesce for quad port ISP27XX (bsc#1203935).\n- scsi: qla2xxx: Drop DID_TARGET_FAILURE use (bsc#1203935).\n- scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() (bsc#1203935).\n- scsi: qla2xxx: Fix response queue handler reading stale packets (bsc#1203935).\n- scsi: qla2xxx: Log message 'skipping scsi_scan_host()' as informational (bsc#1203935).\n- scsi: qla2xxx: Remove unused declarations for qla2xxx (bsc#1203935).\n- scsi: qla2xxx: Remove unused del_sess_list field (bsc#1203935).\n- scsi: qla2xxx: Remove unused qlt_tmr_work() (bsc#1203935).\n- scsi: qla2xxx: Revert 'scsi: qla2xxx: Fix response queue handler reading stale packets' (bsc#1203935).\n- scsi: qla2xxx: Update version to 10.02.07.900-k (bsc#1203935).\n- scsi: sg: Allow waiting for commands to complete on removed device (git-fixes).\n- scsi: smartpqi: Fix DMA direction for RAID requests (git-fixes).\n- scsi: smartpqi: Shorten drive visibility after removal (bsc#1200622).\n- scsi: smartpqi: Update LUN reset handler (bsc#1200622).\n- selftests: futex: Use variable MAKE instead of make (git-fixes).\n- serial: 8250_dw: Store LSR into lsr_saved_flags in dw8250_tx_wait_empty() (git-fixes).\n- serial: fsl_lpuart: RS485 RTS polariy is inverse (git-fixes).\n- serial: mvebu-uart: uart2 error bits clearing (git-fixes).\n- serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 (git-fixes).\n- soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs (git-fixes).\n- soc: fsl: guts: machine variable might be unset (git-fixes).\n- soundwire: bus_type: fix remove and shutdown support (git-fixes).\n- spi: Fix incorrect cs_setup delay handling (git-fixes).\n- spi: spi-rspi: Fix PIO fallback on RZ platforms (git-fixes).\n- spi: synquacer: Add missing clk_disable_unprepare() (git-fixes).\n- spmi: trace: fix stack-out-of-bound access in SPMI tracing functions (git-fixes).\n- squashfs: fix divide error in calculate_skip() (git-fixes).\n- staging: rtl8192u: Fix sleep in atomic context bug in dm_fsync_timer_callback (git-fixes).\n- staging: rtl8712: fix use after free bugs (git-fixes).\n- SUNRPC reverting d03727b248d0 ('NFSv4 fix CLOSE not waiting for direct IO compeletion') (git-fixes).\n- SUNRPC: Clean up scheduling of autoclose (git-fixes).\n- SUNRPC: Do not call connect() more than once on a TCP socket (git-fixes).\n- SUNRPC: Do not dereference xprt->snd_task if it's a cookie (git-fixes).\n- SUNRPC: Do not leak sockets in xs_local_connect() (git-fixes).\n- SUNRPC: fix expiry of auth creds (git-fixes).\n- SUNRPC: Fix misplaced barrier in call_decode (git-fixes).\n- SUNRPC: Fix READ_PLUS crasher (git-fixes).\n- SUNRPC: Partial revert of commit 6f9f17287e78 (git-fixes).\n- SUNRPC: Prevent immediate close+reconnect (git-fixes).\n- SUNRPC: Reinitialise the backchannel request buffers before reuse (git-fixes).\n- SUNRPC: RPC level errors should set task->tk_rpc_status (git-fixes).\n- svcrdma: Hold private mutex while invoking rdma_accept() (git-fixes).\n- tee: optee: Fix incorrect page free bug (git-fixes).\n- thermal: Fix NULL pointer dereferences in of_thermal_ functions (git-fixes).\n- thermal: sysfs: Fix cooling_device_stats_setup() error code path (git-fixes).\n- thermal/tools/tmon: Include pthread and time headers in tmon.h (git-fixes).\n- thunderbolt: Use the actual buffer in tb_async_error() (git-fixes).\n- tick/nohz: Use WARN_ON_ONCE() to prevent console saturation (git fixes (kernel/time)).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tracing: Add ustring operation to filtering string pointers (git-fixes).\n- tracing: hold caller_addr to hardirq_{enable,disable}_ip (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histograms: Fix memory leak problem (git-fixes).\n- tracing/probes: Have kprobes and uprobes use $COMM too (git-fixes).\n- tty: serial: Fix refcount leak bug in ucc_uart.c (git-fixes).\n- tty: serial: lpuart: disable flow control while waiting for the transmit engine to complete (git-fixes).\n- tty: vt: initialize unicode screen buffer (git-fixes).\n- USB: cdc-acm: Add Icom PMR F3400 support (0c26:0020) (git-fixes).\n- USB: core: Fix RST error in hub.c (git-fixes).\n- USB: core: Prevent nested device-reset calls (git-fixes).\n- USB: dwc2: fix wrong order of phy_power_on and phy_init (git-fixes).\n- USB: dwc3: add cancelled reasons for dwc3 requests (git-fixes).\n- USB: dwc3: disable USB core PHY management (git-fixes).\n- USB: dwc3: ep0: Fix delay status handling (git-fixes).\n- USB: dwc3: gadget: END_TRANSFER before CLEAR_STALL command (git-fixes).\n- USB: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- USB: dwc3: gadget: Refactor dwc3_gadget_ep_dequeue (git-fixes).\n- USB: dwc3: gadget: Remove FS bInterval_m1 limitation (git-fixes).\n- USB: dwc3: gadget: Remove unnecessary checks (git-fixes).\n- USB: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- USB: dwc3: gadget: Store resource index of start cmd (git-fixes).\n- USB: dwc3: qcom: fix missing optional irq warnings.\n- USB: dwc3: Switch to platform_get_irq_byname_optional() (git-fixes).\n- USB: ehci: handshake CMD_RUN instead of STS_HALT (git-fixes).\n- USB: Follow-up to SPDX identifiers addition - remove now useless comments (git-fixes).\n- USB: gadget: mass_storage: Fix cdrom data transfers on MAC-OS (git-fixes).\n- USB: gadget: u_audio: fix race condition on endpoint stop (git-fixes).\n- USB: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).\n- USB: gadget: udc: amd5536 depends on HAS_DMA (git-fixes).\n- USB: gadget: uvc: call uvc uvcg_warn on completed status instead of uvcg_info (git-fixes).\n- USB: host: Fix refcount leak in ehci_hcd_ppc_of_probe (git-fixes).\n- USB: host: ohci-ppc-of: Fix refcount leak bug (git-fixes).\n- USB: host: xhci: use snprintf() in xhci_decode_trb() (git-fixes).\n- USB: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe (git-fixes).\n- USB: otg-fsm: Fix hrtimer list corruption (git-fixes).\n- USB: renesas: Fix refcount leak bug (git-fixes).\n- USB: serial: ch341: fix disabled rx timer on older devices (git-fixes).\n- USB: serial: ch341: fix lost character on LCR updates (git-fixes).\n- USB: serial: ch341: name prescaler, divisor registers (git-fixes).\n- USB: serial: cp210x: add Decagon UCA device id (git-fixes).\n- USB: serial: fix tty-port initialized comments (git-fixes).\n- USB: serial: ftdi_sio: add Omron CS1W-CIF31 device id (git-fixes).\n- USB: serial: option: add Quectel EM060K modem (git-fixes).\n- USB: serial: option: add support for Cinterion MV32-WA/WB RmNet mode (git-fixes).\n- USB: serial: option: add support for OPPO R11 diag port (git-fixes).\n- USB: storage: Add ASUS <0x0b05:0x1932> to IGNORE_UAS (git-fixes).\n- USB: storage: Add ignore-residue quirk for NXP PN7462AU (git-fixes).\n- USB: struct usb_device: hide new member (git-fixes).\n- USB: typec: altmodes/displayport: correct pin assignment for UFP receptacles (git-fixes).\n- USB: typec: ucsi: Acknowledge the GET_ERROR_STATUS command completion (git-fixes).\n- USB: xhci: tegra: Fix error check (git-fixes).\n- usbnet: Fix linkwatch use-after-free on disconnect (git-fixes).\n- usbnet: Fix memory leak in usbnet_disconnect() (git-fixes).\n- usbnet: smsc95xx: Fix deadlock on runtime resume (git-fixes).\n- vboxguest: Do not use devm for irq (git-fixes).\n- vfio/ccw: Remove UUID from s390 debug log (git-fixes).\n- video: fbdev: amba-clcd: Fix refcount leak bugs (git-fixes).\n- video: fbdev: arkfb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: arkfb: Fix a divide-by-zero bug in ark_set_pixclock() (git-fixes).\n- video: fbdev: i740fb: Check the argument of i740_calc_vclk() (git-fixes).\n- video: fbdev: s3fb: Check the size of screen before memset_io() (git-fixes).\n- video: fbdev: sis: fix typos in SiS_GetModeID() (git-fixes).\n- video: fbdev: vt8623fb: Check the size of screen before memset_io() (git-fixes).\n- virtio_net: fix memory leak inside XPD_TX with mergeable (git-fixes).\n- virtio-gpu: fix a missing check to avoid NULL dereference (git-fixes).\n- virtio-net: fix the race between refill work and close (git-fixes).\n- VMCI: Add support for ARM64 (bsc#1199291, jsc#SLE-24635).\n- VMCI: Check exclusive_vectors when freeing interrupt 1 (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add MMIO access to registers (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add support for DMA datagrams receive (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: add support for DMA datagrams sends (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: allocate send and receive buffers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: detect DMA datagram capability (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: register dummy IRQ handlers for DMA datagrams (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: set OS page size (bsc#1199291, jsc#SLE-24635).\n- VMCI: dma dg: whitespace formatting change for vmci register defines (bsc#1199291, jsc#SLE-24635).\n- VMCI: Enforce queuepair max size for IOCTL_VMCI_QUEUEPAIR_ALLOC (bsc#1199291, jsc#SLE-24635).\n- VMCI: Fix some error handling paths in vmci_guest_probe_device() (bsc#1199291, jsc#SLE-24635).\n- VMCI: Release notification_bitmap in error path (bsc#1199291, jsc#SLE-24635).\n- vmxnet3: add command to set ring buffer sizes (bsc#1200431).\n- vmxnet3: add support for capability registers (bsc#1200431).\n- vmxnet3: add support for large passthrough BAR register (bsc#1200431).\n- vmxnet3: add support for out of order rx completion (bsc#1200431).\n- vmxnet3: disable overlay offloads if UPT device does not support (bsc#1200431).\n- vmxnet3: do not reschedule napi for rx processing (bsc#1200431).\n- vmxnet3: do not stop tx queues after netif_device_detach() (bsc#1200431).\n- vmxnet3: Implement ethtool's get_channels command (bsc#1200431).\n- vmxnet3: limit number of TXDs used for TSO packet (bsc#1200431).\n- vmxnet3: prepare for version 7 changes (bsc#1200431).\n- vmxnet3: Record queue number to incoming packets (bsc#1200431).\n- vmxnet3: Remove useless DMA-32 fallback configuration (bsc#1200431).\n- vmxnet3: switch from 'pci_' to 'dma_' API (bsc#1200431).\n- vmxnet3: update to version 7 (bsc#1200431).\n- vmxnet3: use ext1 field to indicate encapsulated packet (bsc#1200431).\n- vsock: Fix memory leak in vsock_connect() (git-fixes).\n- vsock: Set socket state back to SS_UNCONNECTED in vsock_connect_timeout() (git-fixes).\n- vt: Clear selection before changing the font (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- watchdog: armada_37xx_wdt: check the return value of devm_ioremap() in armada_37xx_wdt_probe() (git-fixes).\n- watchdog: wdat_wdt: Set the min and max timeout values properly (bsc#1194023).\n- wifi: cfg80211: debugfs: fix return type in ht40allow_map_read() (git-fixes).\n- wifi: iwlegacy: 4965: corrected fix for potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue (git-fixes).\n- wifi: libertas: Fix possible refcount leak in if_usb_probe() (git-fixes).\n- wifi: mac80211_hwsim: add back erroneously removed cast (git-fixes).\n- wifi: mac80211_hwsim: fix race condition in pending packet (git-fixes).\n- wifi: mac80211_hwsim: use 32-bit skb cookie (git-fixes).\n- wifi: mac80211: Do not finalize CSA in IBSS mode if state is disconnected (git-fixes).\n- wifi: p54: add missing parentheses in p54_flush() (git-fixes).\n- wifi: p54: Fix an error handling path in p54spi_probe() (git-fixes).\n- wifi: rtlwifi: fix error codes in rtl_debugfs_set_write_h2c() (git-fixes).\n- wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() (git-fixes).\n- wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` (git-fixes).\n- x86/bugs: Reenable retbleed=off While for older kernels the return thunks are statically built in and cannot be dynamically patched out, retbleed=off should still work so that it can be disabled.\n- x86/kexec: fix memory leak of elf header buffer (bsc#1196444).\n- x86/olpc: fix 'logical not is only applied to the left hand side' (git-fixes).\n- x86/xen: Remove undefined behavior in setup_features() (git-fixes).\n- xen/xenbus: fix return type in xenbus_file_read() (git-fixes).\n- xfs: bunmapi has unnecessary AG lock ordering issues (git-fixes).\n- xfs: check sb_meta_uuid for dabuf buffer recovery (bsc#1202577).\n- xfs: Fix assert failure in xfs_setattr_size() (git-fixes).\n- xfs: make xfs_rtalloc_query_range input parameters const (git-fixes).\n- xfs: mark a data structure sick if there are cross-referencing errors (git-fixes).\n- xfs: only reset incore inode health state flags when reclaiming an inode (git-fixes).\n- xfs: prevent a UAF when log IO errors race with unmount (git-fixes).\n- xfs: use kmem_cache_free() for kmem_cache objects (git-fixes).\n- xprtrdma: Fix cwnd update ordering (git-fixes).\n- xprtrdma: Fix XDRBUF_SPARSE_PAGES support (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-3609,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3609,openSUSE-SLE-15.3-2022-3609", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3609-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:3609-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20223609-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:3609-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html", }, { category: "self", summary: "SUSE Bug 1023051", url: "https://bugzilla.suse.com/1023051", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1177471", url: "https://bugzilla.suse.com/1177471", }, { category: "self", summary: "SUSE Bug 1179722", url: "https://bugzilla.suse.com/1179722", }, { category: "self", summary: "SUSE Bug 1179723", url: "https://bugzilla.suse.com/1179723", }, { category: "self", summary: "SUSE Bug 1181862", url: "https://bugzilla.suse.com/1181862", }, { category: "self", summary: "SUSE Bug 1185032", url: "https://bugzilla.suse.com/1185032", }, { category: "self", summary: "SUSE Bug 1191662", url: "https://bugzilla.suse.com/1191662", }, { category: "self", summary: "SUSE Bug 1191667", url: "https://bugzilla.suse.com/1191667", }, { category: "self", summary: "SUSE Bug 1191881", url: "https://bugzilla.suse.com/1191881", }, { category: "self", summary: "SUSE Bug 1192594", url: "https://bugzilla.suse.com/1192594", }, { category: "self", summary: "SUSE Bug 1194023", url: "https://bugzilla.suse.com/1194023", }, { category: "self", summary: "SUSE Bug 1194272", url: "https://bugzilla.suse.com/1194272", }, { category: "self", summary: "SUSE Bug 1194535", url: "https://bugzilla.suse.com/1194535", }, { category: "self", summary: "SUSE Bug 1196444", url: "https://bugzilla.suse.com/1196444", }, { category: "self", summary: "SUSE Bug 1196616", url: "https://bugzilla.suse.com/1196616", }, { category: "self", summary: "SUSE Bug 1196867", url: "https://bugzilla.suse.com/1196867", }, { category: "self", summary: "SUSE Bug 1197158", url: "https://bugzilla.suse.com/1197158", }, { category: "self", summary: "SUSE Bug 1197659", url: "https://bugzilla.suse.com/1197659", }, { category: "self", summary: "SUSE Bug 1197755", url: "https://bugzilla.suse.com/1197755", }, { category: "self", summary: "SUSE Bug 1197756", url: "https://bugzilla.suse.com/1197756", }, { category: "self", summary: "SUSE Bug 1197757", url: "https://bugzilla.suse.com/1197757", }, { category: "self", summary: "SUSE Bug 1197760", url: "https://bugzilla.suse.com/1197760", }, { category: "self", summary: "SUSE Bug 1197763", url: "https://bugzilla.suse.com/1197763", }, { category: "self", summary: "SUSE Bug 1197920", url: "https://bugzilla.suse.com/1197920", }, { category: "self", summary: "SUSE Bug 1198971", url: "https://bugzilla.suse.com/1198971", }, { category: "self", summary: "SUSE Bug 1199255", url: "https://bugzilla.suse.com/1199255", }, { category: "self", summary: "SUSE Bug 1199291", url: "https://bugzilla.suse.com/1199291", }, { category: "self", summary: "SUSE Bug 1200084", url: "https://bugzilla.suse.com/1200084", }, { category: "self", summary: "SUSE Bug 1200313", url: "https://bugzilla.suse.com/1200313", }, { category: "self", summary: "SUSE Bug 1200431", url: "https://bugzilla.suse.com/1200431", }, { category: "self", summary: "SUSE Bug 1200622", url: "https://bugzilla.suse.com/1200622", }, { category: "self", summary: "SUSE Bug 1200845", url: "https://bugzilla.suse.com/1200845", }, { category: "self", summary: "SUSE Bug 1200868", url: "https://bugzilla.suse.com/1200868", }, { category: "self", summary: "SUSE Bug 1200869", url: "https://bugzilla.suse.com/1200869", }, { category: "self", summary: "SUSE Bug 1200870", url: "https://bugzilla.suse.com/1200870", }, { category: "self", summary: "SUSE Bug 1200871", url: "https://bugzilla.suse.com/1200871", }, { category: "self", summary: "SUSE Bug 1200872", url: "https://bugzilla.suse.com/1200872", }, { category: "self", summary: "SUSE Bug 1200873", url: "https://bugzilla.suse.com/1200873", }, { category: "self", summary: "SUSE Bug 1201019", url: "https://bugzilla.suse.com/1201019", }, { category: "self", summary: "SUSE Bug 1201309", url: "https://bugzilla.suse.com/1201309", }, { category: "self", summary: "SUSE Bug 1201310", url: "https://bugzilla.suse.com/1201310", }, { category: "self", summary: "SUSE Bug 1201420", url: "https://bugzilla.suse.com/1201420", }, { category: "self", summary: "SUSE Bug 1201442", url: "https://bugzilla.suse.com/1201442", }, { category: "self", summary: "SUSE Bug 1201489", url: "https://bugzilla.suse.com/1201489", }, { category: "self", summary: "SUSE Bug 1201610", url: "https://bugzilla.suse.com/1201610", }, { category: "self", summary: "SUSE Bug 1201645", url: "https://bugzilla.suse.com/1201645", }, { category: "self", summary: "SUSE Bug 1201705", url: "https://bugzilla.suse.com/1201705", }, { category: "self", summary: "SUSE Bug 1201726", url: "https://bugzilla.suse.com/1201726", }, { category: "self", summary: "SUSE Bug 1201865", url: "https://bugzilla.suse.com/1201865", }, { category: "self", summary: "SUSE Bug 1201948", url: "https://bugzilla.suse.com/1201948", }, { category: "self", summary: "SUSE Bug 1201990", url: "https://bugzilla.suse.com/1201990", }, { category: "self", summary: "SUSE Bug 1202095", url: "https://bugzilla.suse.com/1202095", }, { category: "self", summary: "SUSE Bug 1202096", url: "https://bugzilla.suse.com/1202096", }, { category: "self", summary: "SUSE Bug 1202097", url: "https://bugzilla.suse.com/1202097", }, { category: "self", summary: "SUSE Bug 1202154", url: "https://bugzilla.suse.com/1202154", }, { category: "self", summary: "SUSE Bug 1202341", url: "https://bugzilla.suse.com/1202341", }, { category: "self", summary: "SUSE Bug 1202346", url: "https://bugzilla.suse.com/1202346", }, { category: "self", summary: "SUSE Bug 1202347", url: "https://bugzilla.suse.com/1202347", }, { category: "self", summary: "SUSE Bug 1202385", url: "https://bugzilla.suse.com/1202385", }, { category: "self", summary: "SUSE Bug 1202393", url: "https://bugzilla.suse.com/1202393", }, { category: "self", summary: "SUSE Bug 1202396", url: "https://bugzilla.suse.com/1202396", }, { category: "self", summary: "SUSE Bug 1202447", url: "https://bugzilla.suse.com/1202447", }, { category: "self", summary: "SUSE Bug 1202577", url: "https://bugzilla.suse.com/1202577", }, { category: "self", summary: "SUSE Bug 1202636", url: "https://bugzilla.suse.com/1202636", }, { category: "self", summary: "SUSE Bug 1202672", url: "https://bugzilla.suse.com/1202672", }, { category: "self", summary: "SUSE Bug 1202677", url: "https://bugzilla.suse.com/1202677", }, { category: "self", summary: "SUSE Bug 1202701", url: "https://bugzilla.suse.com/1202701", }, { category: "self", summary: "SUSE Bug 1202708", url: "https://bugzilla.suse.com/1202708", }, { category: "self", summary: "SUSE Bug 1202709", url: "https://bugzilla.suse.com/1202709", }, { category: "self", summary: "SUSE Bug 1202710", url: "https://bugzilla.suse.com/1202710", }, { category: "self", summary: "SUSE Bug 1202711", url: "https://bugzilla.suse.com/1202711", }, { category: "self", summary: "SUSE Bug 1202712", url: "https://bugzilla.suse.com/1202712", }, { category: "self", summary: "SUSE Bug 1202713", url: "https://bugzilla.suse.com/1202713", }, { category: "self", summary: "SUSE Bug 1202714", url: "https://bugzilla.suse.com/1202714", }, { category: "self", summary: "SUSE Bug 1202715", url: "https://bugzilla.suse.com/1202715", }, { category: "self", summary: "SUSE Bug 1202716", url: "https://bugzilla.suse.com/1202716", }, { category: "self", summary: "SUSE Bug 1202717", url: "https://bugzilla.suse.com/1202717", }, { category: "self", summary: "SUSE Bug 1202718", url: "https://bugzilla.suse.com/1202718", }, { category: "self", summary: "SUSE Bug 1202720", url: "https://bugzilla.suse.com/1202720", }, { category: "self", summary: "SUSE Bug 1202722", url: "https://bugzilla.suse.com/1202722", }, { category: "self", summary: "SUSE Bug 1202745", url: "https://bugzilla.suse.com/1202745", }, { category: "self", summary: "SUSE Bug 1202756", url: "https://bugzilla.suse.com/1202756", }, { category: "self", summary: "SUSE Bug 1202810", url: "https://bugzilla.suse.com/1202810", }, { category: "self", summary: "SUSE Bug 1202811", url: "https://bugzilla.suse.com/1202811", }, { category: "self", summary: "SUSE Bug 1202860", url: "https://bugzilla.suse.com/1202860", }, { category: "self", summary: "SUSE Bug 1202895", url: "https://bugzilla.suse.com/1202895", }, { category: "self", summary: "SUSE Bug 1202898", url: "https://bugzilla.suse.com/1202898", }, { category: "self", summary: "SUSE Bug 1202960", url: "https://bugzilla.suse.com/1202960", }, { category: "self", summary: "SUSE Bug 1202984", url: "https://bugzilla.suse.com/1202984", }, { category: "self", summary: "SUSE Bug 1203063", url: "https://bugzilla.suse.com/1203063", }, { category: "self", summary: "SUSE Bug 1203098", url: "https://bugzilla.suse.com/1203098", }, { category: "self", summary: "SUSE Bug 1203107", url: "https://bugzilla.suse.com/1203107", }, { category: "self", summary: "SUSE Bug 1203116", url: "https://bugzilla.suse.com/1203116", }, { category: "self", summary: "SUSE Bug 1203117", url: "https://bugzilla.suse.com/1203117", }, { category: "self", summary: "SUSE Bug 1203135", url: "https://bugzilla.suse.com/1203135", }, { category: "self", summary: "SUSE Bug 1203136", url: "https://bugzilla.suse.com/1203136", }, { category: "self", summary: "SUSE Bug 1203137", url: "https://bugzilla.suse.com/1203137", }, { category: "self", summary: "SUSE Bug 1203159", url: "https://bugzilla.suse.com/1203159", }, { category: "self", summary: "SUSE Bug 1203313", url: "https://bugzilla.suse.com/1203313", }, { category: "self", summary: "SUSE Bug 1203389", url: "https://bugzilla.suse.com/1203389", }, { category: "self", summary: "SUSE Bug 1203410", url: "https://bugzilla.suse.com/1203410", }, { category: "self", summary: "SUSE Bug 1203424", url: "https://bugzilla.suse.com/1203424", }, { category: "self", summary: "SUSE Bug 1203552", url: "https://bugzilla.suse.com/1203552", }, { category: "self", summary: "SUSE Bug 1203622", url: "https://bugzilla.suse.com/1203622", }, { category: "self", summary: "SUSE Bug 1203737", url: "https://bugzilla.suse.com/1203737", }, { category: "self", summary: "SUSE Bug 1203769", url: "https://bugzilla.suse.com/1203769", }, { category: "self", summary: "SUSE Bug 1203906", url: "https://bugzilla.suse.com/1203906", }, { category: "self", summary: "SUSE Bug 1203909", url: "https://bugzilla.suse.com/1203909", }, { category: "self", summary: "SUSE Bug 1203933", url: "https://bugzilla.suse.com/1203933", }, { category: "self", summary: "SUSE Bug 1203935", url: "https://bugzilla.suse.com/1203935", }, { category: "self", summary: "SUSE Bug 1203939", url: "https://bugzilla.suse.com/1203939", }, { category: "self", summary: "SUSE Bug 1203987", url: "https://bugzilla.suse.com/1203987", }, { category: "self", summary: "SUSE Bug 1203992", url: "https://bugzilla.suse.com/1203992", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2020-16119 page", url: "https://www.suse.com/security/cve/CVE-2020-16119/", }, { category: "self", summary: "SUSE CVE CVE-2020-27784 page", url: "https://www.suse.com/security/cve/CVE-2020-27784/", }, { category: "self", summary: "SUSE CVE CVE-2020-36516 page", url: "https://www.suse.com/security/cve/CVE-2020-36516/", }, { category: "self", summary: "SUSE CVE CVE-2021-4155 page", url: "https://www.suse.com/security/cve/CVE-2021-4155/", }, { category: "self", summary: "SUSE CVE CVE-2021-4203 page", url: "https://www.suse.com/security/cve/CVE-2021-4203/", }, { category: "self", summary: "SUSE CVE CVE-2022-20368 page", url: "https://www.suse.com/security/cve/CVE-2022-20368/", }, { category: "self", summary: "SUSE CVE CVE-2022-20369 page", url: "https://www.suse.com/security/cve/CVE-2022-20369/", }, { category: "self", summary: "SUSE CVE CVE-2022-2503 page", url: "https://www.suse.com/security/cve/CVE-2022-2503/", }, { category: "self", summary: "SUSE CVE CVE-2022-2586 page", url: "https://www.suse.com/security/cve/CVE-2022-2586/", }, { category: "self", summary: "SUSE CVE CVE-2022-2588 page", url: "https://www.suse.com/security/cve/CVE-2022-2588/", }, { category: "self", summary: "SUSE CVE CVE-2022-26373 page", url: "https://www.suse.com/security/cve/CVE-2022-26373/", }, { category: "self", summary: "SUSE CVE CVE-2022-2639 page", url: "https://www.suse.com/security/cve/CVE-2022-2639/", }, { category: "self", summary: "SUSE CVE CVE-2022-2663 page", url: "https://www.suse.com/security/cve/CVE-2022-2663/", }, { category: "self", summary: "SUSE CVE CVE-2022-2905 page", url: "https://www.suse.com/security/cve/CVE-2022-2905/", }, { category: "self", summary: "SUSE CVE CVE-2022-2977 page", url: "https://www.suse.com/security/cve/CVE-2022-2977/", }, { category: "self", summary: "SUSE CVE CVE-2022-3028 page", url: "https://www.suse.com/security/cve/CVE-2022-3028/", }, { category: "self", summary: "SUSE CVE CVE-2022-3239 page", url: "https://www.suse.com/security/cve/CVE-2022-3239/", }, { category: "self", summary: "SUSE CVE CVE-2022-3303 page", url: "https://www.suse.com/security/cve/CVE-2022-3303/", }, { category: "self", summary: "SUSE CVE CVE-2022-36879 page", url: "https://www.suse.com/security/cve/CVE-2022-36879/", }, { category: "self", summary: "SUSE CVE CVE-2022-39188 page", url: "https://www.suse.com/security/cve/CVE-2022-39188/", }, { category: "self", summary: "SUSE CVE CVE-2022-39190 page", url: "https://www.suse.com/security/cve/CVE-2022-39190/", }, { category: "self", summary: "SUSE CVE CVE-2022-41218 page", url: "https://www.suse.com/security/cve/CVE-2022-41218/", }, { category: "self", summary: "SUSE CVE CVE-2022-41222 page", url: "https://www.suse.com/security/cve/CVE-2022-41222/", }, { category: "self", summary: "SUSE CVE CVE-2022-41848 page", url: "https://www.suse.com/security/cve/CVE-2022-41848/", }, { category: "self", summary: "SUSE CVE CVE-2022-41849 page", url: "https://www.suse.com/security/cve/CVE-2022-41849/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2022-10-18T09:44:53Z", generator: { date: "2022-10-18T09:44:53Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:3609-1", initial_release_date: "2022-10-18T09:44:53Z", revision_history: [ { date: "2022-10-18T09:44:53Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-5.3.18-150300.38.80.1.noarch", product: { name: "kernel-devel-azure-5.3.18-150300.38.80.1.noarch", product_id: "kernel-devel-azure-5.3.18-150300.38.80.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.3.18-150300.38.80.1.noarch", product: { name: "kernel-source-azure-5.3.18-150300.38.80.1.noarch", product_id: "kernel-source-azure-5.3.18-150300.38.80.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", product: { name: "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", product_id: "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", product: { name: "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", product_id: "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", product: { name: "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", product_id: "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.3.18-150300.38.80.1.x86_64", product: { name: "kernel-azure-5.3.18-150300.38.80.1.x86_64", product_id: "kernel-azure-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", product: { name: "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", product_id: "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", product: { name: "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", product_id: "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", product: { name: "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", product_id: "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", product: { name: "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", product_id: "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", product: { name: "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", product_id: "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", product: { name: "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", product_id: "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", product: { name: "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", product_id: "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.3.18-150300.38.80.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kernel-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.3.18-150300.38.80.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", }, product_reference: "kernel-devel-azure-5.3.18-150300.38.80.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.3.18-150300.38.80.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", }, product_reference: "kernel-source-azure-5.3.18-150300.38.80.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kernel-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.3.18-150300.38.80.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", }, product_reference: "kernel-devel-azure-5.3.18-150300.38.80.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.3.18-150300.38.80.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", }, product_reference: "kernel-source-azure-5.3.18-150300.38.80.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2020-16119", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16119", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16119", url: "https://www.suse.com/security/cve/CVE-2020-16119", }, { category: "external", summary: "SUSE Bug 1177471 for CVE-2020-16119", url: "https://bugzilla.suse.com/1177471", }, { category: "external", summary: "SUSE Bug 1177742 for CVE-2020-16119", url: "https://bugzilla.suse.com/1177742", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "important", }, ], title: "CVE-2020-16119", }, { cve: "CVE-2020-27784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27784", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27784", url: "https://www.suse.com/security/cve/CVE-2020-27784", }, { category: "external", summary: "SUSE Bug 1202895 for CVE-2020-27784", url: "https://bugzilla.suse.com/1202895", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "low", }, ], title: "CVE-2020-27784", }, { cve: "CVE-2020-36516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36516", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36516", url: "https://www.suse.com/security/cve/CVE-2020-36516", }, { category: "external", summary: "SUSE Bug 1196616 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196616", }, { category: "external", summary: "SUSE Bug 1196867 for CVE-2020-36516", url: "https://bugzilla.suse.com/1196867", }, { category: "external", summary: "SUSE Bug 1204092 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204092", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2020-36516", url: "https://bugzilla.suse.com/1204183", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "important", }, ], title: "CVE-2020-36516", }, { cve: "CVE-2021-4155", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4155", }, ], notes: [ { category: "general", text: "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4155", url: "https://www.suse.com/security/cve/CVE-2021-4155", }, { category: "external", summary: "SUSE Bug 1194272 for CVE-2021-4155", url: "https://bugzilla.suse.com/1194272", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2021-4155", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2021-4155", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2021-4155", }, { cve: "CVE-2021-4203", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4203", }, ], notes: [ { category: "general", text: "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4203", url: "https://www.suse.com/security/cve/CVE-2021-4203", }, { category: "external", summary: "SUSE Bug 1194535 for CVE-2021-4203", url: "https://bugzilla.suse.com/1194535", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2021-4203", }, { cve: "CVE-2022-20368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20368", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20368", url: "https://www.suse.com/security/cve/CVE-2022-20368", }, { category: "external", summary: "SUSE Bug 1202346 for CVE-2022-20368", url: "https://bugzilla.suse.com/1202346", }, { category: "external", summary: "SUSE Bug 1212311 for CVE-2022-20368", url: "https://bugzilla.suse.com/1212311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-20369", }, ], notes: [ { category: "general", text: "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-20369", url: "https://www.suse.com/security/cve/CVE-2022-20369", }, { category: "external", summary: "SUSE Bug 1202347 for CVE-2022-20369", url: "https://bugzilla.suse.com/1202347", }, { category: "external", summary: "SUSE Bug 1212321 for CVE-2022-20369", url: "https://bugzilla.suse.com/1212321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-20369", }, { cve: "CVE-2022-2503", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2503", }, ], notes: [ { category: "general", text: "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2503", url: "https://www.suse.com/security/cve/CVE-2022-2503", }, { category: "external", summary: "SUSE Bug 1202677 for CVE-2022-2503", url: "https://bugzilla.suse.com/1202677", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-2503", }, { cve: "CVE-2022-2586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2586", }, ], notes: [ { category: "general", text: "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2586", url: "https://www.suse.com/security/cve/CVE-2022-2586", }, { category: "external", summary: "SUSE Bug 1202095 for CVE-2022-2586", url: "https://bugzilla.suse.com/1202095", }, { category: "external", summary: "SUSE Bug 1209719 for CVE-2022-2586", url: "https://bugzilla.suse.com/1209719", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-2586", }, { cve: "CVE-2022-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2588", }, ], notes: [ { category: "general", text: "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2588", url: "https://www.suse.com/security/cve/CVE-2022-2588", }, { category: "external", summary: "SUSE Bug 1202096 for CVE-2022-2588", url: "https://bugzilla.suse.com/1202096", }, { category: "external", summary: "SUSE Bug 1203613 for CVE-2022-2588", url: "https://bugzilla.suse.com/1203613", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2022-2588", url: "https://bugzilla.suse.com/1204183", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-2588", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "important", }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-26373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26373", }, ], notes: [ { category: "general", text: "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26373", url: "https://www.suse.com/security/cve/CVE-2022-26373", }, { category: "external", summary: "SUSE Bug 1201726 for CVE-2022-26373", url: "https://bugzilla.suse.com/1201726", }, { category: "external", summary: "SUSE Bug 1209619 for CVE-2022-26373", url: "https://bugzilla.suse.com/1209619", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2639", }, ], notes: [ { category: "general", text: "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2639", url: "https://www.suse.com/security/cve/CVE-2022-2639", }, { category: "external", summary: "SUSE Bug 1202154 for CVE-2022-2639", url: "https://bugzilla.suse.com/1202154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-2639", }, { cve: "CVE-2022-2663", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2663", }, ], notes: [ { category: "general", text: "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2663", url: "https://www.suse.com/security/cve/CVE-2022-2663", }, { category: "external", summary: "SUSE Bug 1202097 for CVE-2022-2663", url: "https://bugzilla.suse.com/1202097", }, { category: "external", summary: "SUSE Bug 1212299 for CVE-2022-2663", url: "https://bugzilla.suse.com/1212299", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-2663", }, { cve: "CVE-2022-2905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2905", }, ], notes: [ { category: "general", text: "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2905", url: "https://www.suse.com/security/cve/CVE-2022-2905", }, { category: "external", summary: "SUSE Bug 1202860 for CVE-2022-2905", url: "https://bugzilla.suse.com/1202860", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-2905", }, { cve: "CVE-2022-2977", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2977", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2977", url: "https://www.suse.com/security/cve/CVE-2022-2977", }, { category: "external", summary: "SUSE Bug 1202672 for CVE-2022-2977", url: "https://bugzilla.suse.com/1202672", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-2977", }, { cve: "CVE-2022-3028", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3028", }, ], notes: [ { category: "general", text: "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3028", url: "https://www.suse.com/security/cve/CVE-2022-3028", }, { category: "external", summary: "SUSE Bug 1202898 for CVE-2022-3028", url: "https://bugzilla.suse.com/1202898", }, { category: "external", summary: "SUSE Bug 1212296 for CVE-2022-3028", url: "https://bugzilla.suse.com/1212296", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-3028", }, { cve: "CVE-2022-3239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3239", }, ], notes: [ { category: "general", text: "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3239", url: "https://www.suse.com/security/cve/CVE-2022-3239", }, { category: "external", summary: "SUSE Bug 1203552 for CVE-2022-3239", url: "https://bugzilla.suse.com/1203552", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-3239", }, { cve: "CVE-2022-3303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3303", }, ], notes: [ { category: "general", text: "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3303", url: "https://www.suse.com/security/cve/CVE-2022-3303", }, { category: "external", summary: "SUSE Bug 1203769 for CVE-2022-3303", url: "https://bugzilla.suse.com/1203769", }, { category: "external", summary: "SUSE Bug 1212304 for CVE-2022-3303", url: "https://bugzilla.suse.com/1212304", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-3303", }, { cve: "CVE-2022-36879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36879", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36879", url: "https://www.suse.com/security/cve/CVE-2022-36879", }, { category: "external", summary: "SUSE Bug 1201948 for CVE-2022-36879", url: "https://bugzilla.suse.com/1201948", }, { category: "external", summary: "SUSE Bug 1212327 for CVE-2022-36879", url: "https://bugzilla.suse.com/1212327", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-36879", }, { cve: "CVE-2022-39188", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39188", }, ], notes: [ { category: "general", text: "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39188", url: "https://www.suse.com/security/cve/CVE-2022-39188", }, { category: "external", summary: "SUSE Bug 1203107 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203107", }, { category: "external", summary: "SUSE Bug 1203116 for CVE-2022-39188", url: "https://bugzilla.suse.com/1203116", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-39188", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-39188", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1212326 for CVE-2022-39188", url: "https://bugzilla.suse.com/1212326", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-39188", }, { cve: "CVE-2022-39190", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-39190", }, ], notes: [ { category: "general", text: "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-39190", url: "https://www.suse.com/security/cve/CVE-2022-39190", }, { category: "external", summary: "SUSE Bug 1203117 for CVE-2022-39190", url: "https://bugzilla.suse.com/1203117", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-39190", }, { cve: "CVE-2022-41218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41218", }, ], notes: [ { category: "general", text: "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41218", url: "https://www.suse.com/security/cve/CVE-2022-41218", }, { category: "external", summary: "SUSE Bug 1202960 for CVE-2022-41218", url: "https://bugzilla.suse.com/1202960", }, { category: "external", summary: "SUSE Bug 1203606 for CVE-2022-41218", url: "https://bugzilla.suse.com/1203606", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-41218", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41218", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "important", }, ], title: "CVE-2022-41218", }, { cve: "CVE-2022-41222", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41222", }, ], notes: [ { category: "general", text: "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41222", url: "https://www.suse.com/security/cve/CVE-2022-41222", }, { category: "external", summary: "SUSE Bug 1203622 for CVE-2022-41222", url: "https://bugzilla.suse.com/1203622", }, { category: "external", summary: "SUSE Bug 1203624 for CVE-2022-41222", url: "https://bugzilla.suse.com/1203624", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41222", url: "https://bugzilla.suse.com/1209225", }, { category: "external", summary: "SUSE Bug 1209476 for CVE-2022-41222", url: "https://bugzilla.suse.com/1209476", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-41222", }, { cve: "CVE-2022-41848", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41848", }, ], notes: [ { category: "general", text: "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41848", url: "https://www.suse.com/security/cve/CVE-2022-41848", }, { category: "external", summary: "SUSE Bug 1203987 for CVE-2022-41848", url: "https://bugzilla.suse.com/1203987", }, { category: "external", summary: "SUSE Bug 1211484 for CVE-2022-41848", url: "https://bugzilla.suse.com/1211484", }, { category: "external", summary: "SUSE Bug 1212317 for CVE-2022-41848", url: "https://bugzilla.suse.com/1212317", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-41848", }, { cve: "CVE-2022-41849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41849", }, ], notes: [ { category: "general", text: "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41849", url: "https://www.suse.com/security/cve/CVE-2022-41849", }, { category: "external", summary: "SUSE Bug 1203992 for CVE-2022-41849", url: "https://bugzilla.suse.com/1203992", }, { category: "external", summary: "SUSE Bug 1217458 for CVE-2022-41849", url: "https://bugzilla.suse.com/1217458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.80.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.80.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.80.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-10-18T09:44:53Z", details: "moderate", }, ], title: "CVE-2022-41849", }, ], }
gsd-2016-3695
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
Aliases
Aliases
{ GSD: { alias: "CVE-2016-3695", description: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", id: "GSD-2016-3695", references: [ "https://www.suse.com/security/cve/CVE-2016-3695.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2016-3695", ], details: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", id: "GSD-2016-3695", modified: "2023-12-13T01:21:27.961049Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-3695", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_affected: "=", version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.securityfocus.com/bid/102327", refsource: "MISC", url: "http://www.securityfocus.com/bid/102327", }, { name: "https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420", refsource: "MISC", url: "https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1322755", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1322755", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2016-3695", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-74", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420", refsource: "CONFIRM", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1322755", refsource: "CONFIRM", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1322755", }, { name: "102327", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/102327", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, }, }, lastModifiedDate: "2018-01-10T16:44Z", publishedDate: "2017-12-29T15:29Z", }, }, }
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-longterm-6.6.17-1.1 on GA media
Notes
Title of the patch
kernel-devel-longterm-6.6.17-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "kernel-devel-longterm-6.6.17-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-13704", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000251 page", url: "https://www.suse.com/security/cve/CVE-2017-1000251/", }, { category: "self", summary: "SUSE CVE CVE-2017-12153 page", url: "https://www.suse.com/security/cve/CVE-2017-12153/", }, { category: "self", summary: "SUSE CVE CVE-2017-13080 page", url: "https://www.suse.com/security/cve/CVE-2017-13080/", }, { category: "self", summary: "SUSE CVE CVE-2017-14051 page", url: "https://www.suse.com/security/cve/CVE-2017-14051/", }, { category: "self", summary: "SUSE CVE CVE-2017-15129 page", url: "https://www.suse.com/security/cve/CVE-2017-15129/", }, { category: "self", summary: "SUSE CVE CVE-2017-15265 page", url: "https://www.suse.com/security/cve/CVE-2017-15265/", }, { category: "self", summary: "SUSE CVE CVE-2017-16536 page", url: "https://www.suse.com/security/cve/CVE-2017-16536/", }, { category: "self", summary: "SUSE CVE CVE-2017-16537 page", url: "https://www.suse.com/security/cve/CVE-2017-16537/", }, { category: "self", summary: "SUSE CVE CVE-2017-16645 page", url: "https://www.suse.com/security/cve/CVE-2017-16645/", }, { category: "self", summary: "SUSE CVE CVE-2017-16646 page", url: "https://www.suse.com/security/cve/CVE-2017-16646/", }, { category: "self", summary: "SUSE CVE CVE-2017-16647 page", url: "https://www.suse.com/security/cve/CVE-2017-16647/", }, { category: "self", summary: "SUSE CVE CVE-2017-16648 page", url: "https://www.suse.com/security/cve/CVE-2017-16648/", }, { category: "self", summary: "SUSE CVE CVE-2017-16995 page", url: "https://www.suse.com/security/cve/CVE-2017-16995/", }, { category: "self", summary: "SUSE CVE CVE-2017-16996 page", url: "https://www.suse.com/security/cve/CVE-2017-16996/", }, { category: "self", summary: "SUSE CVE CVE-2017-17448 page", url: "https://www.suse.com/security/cve/CVE-2017-17448/", }, { category: "self", summary: "SUSE CVE CVE-2017-17449 page", url: "https://www.suse.com/security/cve/CVE-2017-17449/", }, { category: "self", summary: "SUSE CVE CVE-2017-17450 page", url: "https://www.suse.com/security/cve/CVE-2017-17450/", }, { category: "self", summary: "SUSE CVE CVE-2017-17852 page", url: "https://www.suse.com/security/cve/CVE-2017-17852/", }, { category: "self", summary: "SUSE CVE CVE-2017-17853 page", url: "https://www.suse.com/security/cve/CVE-2017-17853/", }, { category: "self", summary: "SUSE CVE CVE-2017-17854 page", url: "https://www.suse.com/security/cve/CVE-2017-17854/", }, { category: "self", summary: "SUSE CVE CVE-2017-17855 page", url: "https://www.suse.com/security/cve/CVE-2017-17855/", }, { category: "self", summary: "SUSE CVE CVE-2017-17856 page", url: "https://www.suse.com/security/cve/CVE-2017-17856/", }, { category: "self", summary: "SUSE CVE CVE-2017-17857 page", url: "https://www.suse.com/security/cve/CVE-2017-17857/", }, { category: "self", summary: "SUSE CVE CVE-2017-17862 page", url: "https://www.suse.com/security/cve/CVE-2017-17862/", }, { category: "self", summary: "SUSE CVE CVE-2017-5123 page", url: "https://www.suse.com/security/cve/CVE-2017-5123/", }, { category: "self", summary: "SUSE CVE CVE-2017-5715 page", url: "https://www.suse.com/security/cve/CVE-2017-5715/", }, { category: "self", summary: "SUSE CVE CVE-2017-5753 page", url: "https://www.suse.com/security/cve/CVE-2017-5753/", }, { category: "self", summary: "SUSE CVE CVE-2017-5754 page", url: "https://www.suse.com/security/cve/CVE-2017-5754/", }, { category: "self", summary: "SUSE CVE CVE-2017-7541 page", url: "https://www.suse.com/security/cve/CVE-2017-7541/", }, { category: "self", summary: "SUSE CVE CVE-2017-7542 page", url: "https://www.suse.com/security/cve/CVE-2017-7542/", }, { category: "self", summary: "SUSE CVE CVE-2017-8824 page", url: "https://www.suse.com/security/cve/CVE-2017-8824/", }, { category: "self", summary: "SUSE CVE CVE-2017-8831 page", url: "https://www.suse.com/security/cve/CVE-2017-8831/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000004 page", url: "https://www.suse.com/security/cve/CVE-2018-1000004/", }, { category: "self", summary: "SUSE CVE CVE-2018-10322 page", url: "https://www.suse.com/security/cve/CVE-2018-10322/", }, { category: "self", summary: "SUSE CVE CVE-2018-10323 page", url: "https://www.suse.com/security/cve/CVE-2018-10323/", }, { category: "self", summary: "SUSE CVE CVE-2018-1068 page", url: "https://www.suse.com/security/cve/CVE-2018-1068/", }, { category: "self", summary: "SUSE CVE CVE-2018-1118 page", url: "https://www.suse.com/security/cve/CVE-2018-1118/", }, { category: "self", summary: "SUSE CVE CVE-2018-12232 page", url: "https://www.suse.com/security/cve/CVE-2018-12232/", }, { category: "self", summary: "SUSE CVE CVE-2018-12714 page", url: "https://www.suse.com/security/cve/CVE-2018-12714/", }, { category: "self", summary: "SUSE CVE CVE-2018-13053 page", url: "https://www.suse.com/security/cve/CVE-2018-13053/", }, { category: "self", summary: "SUSE CVE CVE-2018-18710 page", url: "https://www.suse.com/security/cve/CVE-2018-18710/", }, { category: "self", summary: "SUSE CVE CVE-2018-19824 page", url: "https://www.suse.com/security/cve/CVE-2018-19824/", }, { category: "self", summary: "SUSE CVE CVE-2018-5332 page", url: "https://www.suse.com/security/cve/CVE-2018-5332/", }, { category: "self", summary: "SUSE CVE CVE-2018-5333 page", url: "https://www.suse.com/security/cve/CVE-2018-5333/", }, { category: "self", summary: "SUSE CVE CVE-2018-8043 page", url: "https://www.suse.com/security/cve/CVE-2018-8043/", }, { category: "self", summary: "SUSE CVE CVE-2018-8087 page", url: "https://www.suse.com/security/cve/CVE-2018-8087/", }, { category: "self", summary: "SUSE CVE CVE-2018-8822 page", url: "https://www.suse.com/security/cve/CVE-2018-8822/", }, { category: "self", summary: "SUSE CVE CVE-2019-10207 page", url: "https://www.suse.com/security/cve/CVE-2019-10207/", }, { category: "self", summary: "SUSE CVE CVE-2019-11477 page", url: "https://www.suse.com/security/cve/CVE-2019-11477/", }, { category: "self", summary: "SUSE CVE CVE-2019-11478 page", url: "https://www.suse.com/security/cve/CVE-2019-11478/", }, { category: "self", summary: "SUSE CVE CVE-2019-11479 page", url: "https://www.suse.com/security/cve/CVE-2019-11479/", }, { category: "self", summary: "SUSE CVE CVE-2019-14615 page", url: "https://www.suse.com/security/cve/CVE-2019-14615/", }, { category: "self", summary: "SUSE CVE CVE-2019-14814 page", url: "https://www.suse.com/security/cve/CVE-2019-14814/", }, { category: "self", summary: "SUSE CVE CVE-2019-14896 page", url: "https://www.suse.com/security/cve/CVE-2019-14896/", }, { category: "self", summary: "SUSE CVE CVE-2019-15030 page", url: "https://www.suse.com/security/cve/CVE-2019-15030/", }, { category: "self", summary: "SUSE CVE CVE-2019-15031 page", url: "https://www.suse.com/security/cve/CVE-2019-15031/", }, { category: "self", summary: "SUSE CVE CVE-2019-15098 page", url: "https://www.suse.com/security/cve/CVE-2019-15098/", }, { category: "self", summary: "SUSE CVE CVE-2019-15099 page", url: "https://www.suse.com/security/cve/CVE-2019-15099/", }, { category: "self", summary: "SUSE CVE CVE-2019-15290 page", url: "https://www.suse.com/security/cve/CVE-2019-15290/", }, { category: "self", summary: "SUSE CVE CVE-2019-15504 page", url: "https://www.suse.com/security/cve/CVE-2019-15504/", }, { category: "self", summary: "SUSE CVE CVE-2019-15902 page", url: "https://www.suse.com/security/cve/CVE-2019-15902/", }, { category: "self", summary: "SUSE CVE CVE-2019-16231 page", url: "https://www.suse.com/security/cve/CVE-2019-16231/", }, { category: "self", summary: "SUSE CVE CVE-2019-16232 page", url: "https://www.suse.com/security/cve/CVE-2019-16232/", }, { category: "self", summary: "SUSE CVE CVE-2019-16234 page", url: "https://www.suse.com/security/cve/CVE-2019-16234/", }, { category: "self", summary: "SUSE CVE CVE-2019-17133 page", url: "https://www.suse.com/security/cve/CVE-2019-17133/", }, { category: "self", summary: "SUSE CVE CVE-2019-17666 page", url: "https://www.suse.com/security/cve/CVE-2019-17666/", }, { category: "self", summary: "SUSE CVE CVE-2019-18808 page", url: "https://www.suse.com/security/cve/CVE-2019-18808/", }, { category: "self", summary: "SUSE CVE CVE-2019-18812 page", url: "https://www.suse.com/security/cve/CVE-2019-18812/", }, { category: "self", summary: "SUSE CVE CVE-2019-18813 page", url: "https://www.suse.com/security/cve/CVE-2019-18813/", }, { category: "self", summary: "SUSE CVE CVE-2019-19252 page", url: "https://www.suse.com/security/cve/CVE-2019-19252/", }, { category: "self", summary: "SUSE CVE CVE-2019-19332 page", url: "https://www.suse.com/security/cve/CVE-2019-19332/", }, { category: "self", summary: "SUSE CVE CVE-2019-19338 page", url: "https://www.suse.com/security/cve/CVE-2019-19338/", }, { category: "self", summary: "SUSE CVE CVE-2019-3016 page", url: "https://www.suse.com/security/cve/CVE-2019-3016/", }, { category: "self", summary: "SUSE CVE CVE-2019-3846 page", url: "https://www.suse.com/security/cve/CVE-2019-3846/", }, { category: "self", summary: "SUSE CVE CVE-2019-3882 page", url: "https://www.suse.com/security/cve/CVE-2019-3882/", }, { category: "self", summary: "SUSE CVE CVE-2019-3887 page", url: "https://www.suse.com/security/cve/CVE-2019-3887/", }, { category: "self", summary: "SUSE CVE CVE-2019-6974 page", url: "https://www.suse.com/security/cve/CVE-2019-6974/", }, { category: "self", summary: "SUSE CVE CVE-2019-7221 page", url: "https://www.suse.com/security/cve/CVE-2019-7221/", }, { category: "self", summary: "SUSE CVE CVE-2019-7222 page", url: "https://www.suse.com/security/cve/CVE-2019-7222/", }, { category: "self", summary: "SUSE CVE CVE-2019-8564 page", url: "https://www.suse.com/security/cve/CVE-2019-8564/", }, { category: "self", summary: "SUSE CVE CVE-2019-8912 page", url: "https://www.suse.com/security/cve/CVE-2019-8912/", }, { category: "self", summary: "SUSE CVE CVE-2019-9500 page", url: "https://www.suse.com/security/cve/CVE-2019-9500/", }, { category: "self", summary: "SUSE CVE CVE-2020-10135 page", url: "https://www.suse.com/security/cve/CVE-2020-10135/", }, { category: "self", summary: "SUSE CVE CVE-2020-10766 page", url: "https://www.suse.com/security/cve/CVE-2020-10766/", }, { category: "self", summary: "SUSE CVE CVE-2020-10767 page", url: "https://www.suse.com/security/cve/CVE-2020-10767/", }, { category: "self", summary: "SUSE CVE CVE-2020-10768 page", url: "https://www.suse.com/security/cve/CVE-2020-10768/", }, { category: "self", summary: "SUSE CVE CVE-2020-12351 page", url: "https://www.suse.com/security/cve/CVE-2020-12351/", }, { category: "self", summary: "SUSE CVE CVE-2020-12352 page", url: "https://www.suse.com/security/cve/CVE-2020-12352/", }, { category: "self", summary: "SUSE CVE CVE-2020-14331 page", url: "https://www.suse.com/security/cve/CVE-2020-14331/", }, { category: "self", summary: "SUSE CVE CVE-2020-14386 page", url: "https://www.suse.com/security/cve/CVE-2020-14386/", }, { category: "self", summary: "SUSE CVE CVE-2020-24586 page", url: "https://www.suse.com/security/cve/CVE-2020-24586/", }, { category: "self", summary: "SUSE CVE CVE-2020-24587 page", url: "https://www.suse.com/security/cve/CVE-2020-24587/", }, { category: "self", summary: "SUSE CVE CVE-2020-24588 page", url: "https://www.suse.com/security/cve/CVE-2020-24588/", }, { category: "self", summary: "SUSE CVE CVE-2020-25639 page", url: "https://www.suse.com/security/cve/CVE-2020-25639/", }, { category: "self", summary: "SUSE CVE CVE-2020-25656 page", url: "https://www.suse.com/security/cve/CVE-2020-25656/", }, { category: "self", summary: "SUSE CVE CVE-2020-25668 page", url: "https://www.suse.com/security/cve/CVE-2020-25668/", }, { category: "self", summary: "SUSE CVE CVE-2020-26141 page", url: "https://www.suse.com/security/cve/CVE-2020-26141/", }, { category: "self", summary: "SUSE CVE CVE-2020-2732 page", url: "https://www.suse.com/security/cve/CVE-2020-2732/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-8648 page", url: "https://www.suse.com/security/cve/CVE-2020-8648/", }, { category: "self", summary: "SUSE CVE CVE-2020-8694 page", url: "https://www.suse.com/security/cve/CVE-2020-8694/", }, { category: "self", summary: "SUSE CVE CVE-2021-23133 page", url: "https://www.suse.com/security/cve/CVE-2021-23133/", }, { category: "self", summary: "SUSE CVE CVE-2021-26708 page", url: "https://www.suse.com/security/cve/CVE-2021-26708/", }, { category: "self", summary: "SUSE CVE CVE-2021-28971 page", url: "https://www.suse.com/security/cve/CVE-2021-28971/", }, { category: "self", summary: "SUSE CVE CVE-2021-32606 page", url: "https://www.suse.com/security/cve/CVE-2021-32606/", }, { category: "self", summary: "SUSE CVE CVE-2021-33909 page", url: "https://www.suse.com/security/cve/CVE-2021-33909/", }, { category: "self", summary: "SUSE CVE CVE-2021-3483 page", url: "https://www.suse.com/security/cve/CVE-2021-3483/", }, { category: "self", summary: "SUSE CVE CVE-2021-3489 page", url: "https://www.suse.com/security/cve/CVE-2021-3489/", }, { category: "self", summary: "SUSE CVE CVE-2021-3490 page", url: "https://www.suse.com/security/cve/CVE-2021-3490/", }, { category: "self", summary: "SUSE CVE CVE-2021-3491 page", url: "https://www.suse.com/security/cve/CVE-2021-3491/", }, { category: "self", summary: "SUSE CVE CVE-2021-3542 page", url: "https://www.suse.com/security/cve/CVE-2021-3542/", }, { category: "self", summary: "SUSE CVE CVE-2021-3640 page", url: "https://www.suse.com/security/cve/CVE-2021-3640/", }, { category: "self", summary: "SUSE CVE CVE-2021-3653 page", url: "https://www.suse.com/security/cve/CVE-2021-3653/", }, { category: "self", summary: "SUSE CVE CVE-2021-3656 page", url: "https://www.suse.com/security/cve/CVE-2021-3656/", }, { category: "self", summary: "SUSE CVE CVE-2021-3744 page", url: "https://www.suse.com/security/cve/CVE-2021-3744/", }, { category: "self", summary: "SUSE CVE CVE-2021-3753 page", url: "https://www.suse.com/security/cve/CVE-2021-3753/", }, { category: "self", summary: "SUSE CVE CVE-2021-37576 page", url: "https://www.suse.com/security/cve/CVE-2021-37576/", }, { category: "self", summary: "SUSE CVE CVE-2021-3759 page", url: "https://www.suse.com/security/cve/CVE-2021-3759/", }, { category: "self", summary: "SUSE CVE CVE-2021-38166 page", url: "https://www.suse.com/security/cve/CVE-2021-38166/", }, { category: "self", summary: "SUSE CVE CVE-2021-43976 page", url: "https://www.suse.com/security/cve/CVE-2021-43976/", }, { category: "self", summary: "SUSE CVE CVE-2022-0185 page", url: "https://www.suse.com/security/cve/CVE-2022-0185/", }, { category: "self", summary: "SUSE CVE CVE-2022-0330 page", url: "https://www.suse.com/security/cve/CVE-2022-0330/", }, { category: "self", summary: "SUSE CVE CVE-2022-0847 page", url: "https://www.suse.com/security/cve/CVE-2022-0847/", }, { category: "self", summary: "SUSE CVE CVE-2022-0886 page", url: "https://www.suse.com/security/cve/CVE-2022-0886/", }, { category: "self", summary: "SUSE CVE CVE-2022-1462 page", url: "https://www.suse.com/security/cve/CVE-2022-1462/", }, { category: "self", summary: "SUSE CVE CVE-2022-1516 page", url: "https://www.suse.com/security/cve/CVE-2022-1516/", }, { category: "self", summary: "SUSE CVE CVE-2022-1679 page", url: "https://www.suse.com/security/cve/CVE-2022-1679/", }, { category: "self", summary: "SUSE CVE CVE-2022-1729 page", url: "https://www.suse.com/security/cve/CVE-2022-1729/", }, { category: "self", summary: "SUSE CVE CVE-2022-1852 page", url: "https://www.suse.com/security/cve/CVE-2022-1852/", }, { category: "self", summary: "SUSE CVE CVE-2022-1966 page", url: "https://www.suse.com/security/cve/CVE-2022-1966/", }, { category: "self", summary: "SUSE CVE CVE-2022-1972 page", url: "https://www.suse.com/security/cve/CVE-2022-1972/", }, { category: "self", summary: "SUSE CVE CVE-2022-1973 page", url: "https://www.suse.com/security/cve/CVE-2022-1973/", }, { category: "self", summary: "SUSE CVE CVE-2022-22942 page", url: "https://www.suse.com/security/cve/CVE-2022-22942/", }, { category: "self", summary: "SUSE CVE CVE-2022-2308 page", url: "https://www.suse.com/security/cve/CVE-2022-2308/", }, { category: "self", summary: "SUSE CVE CVE-2022-24958 page", url: "https://www.suse.com/security/cve/CVE-2022-24958/", }, { category: "self", summary: "SUSE CVE CVE-2022-2588 page", url: "https://www.suse.com/security/cve/CVE-2022-2588/", }, { category: "self", summary: "SUSE CVE CVE-2022-2590 page", url: "https://www.suse.com/security/cve/CVE-2022-2590/", }, { category: "self", summary: "SUSE CVE CVE-2022-26490 page", url: "https://www.suse.com/security/cve/CVE-2022-26490/", }, { category: "self", summary: "SUSE CVE CVE-2022-28388 page", url: "https://www.suse.com/security/cve/CVE-2022-28388/", }, { category: "self", summary: "SUSE CVE CVE-2022-28389 page", url: "https://www.suse.com/security/cve/CVE-2022-28389/", }, { category: "self", summary: "SUSE CVE CVE-2022-28390 page", url: "https://www.suse.com/security/cve/CVE-2022-28390/", }, { category: "self", summary: "SUSE CVE CVE-2022-28893 page", url: "https://www.suse.com/security/cve/CVE-2022-28893/", }, { category: "self", summary: "SUSE CVE CVE-2022-29900 page", url: "https://www.suse.com/security/cve/CVE-2022-29900/", }, { category: "self", summary: "SUSE CVE CVE-2022-29901 page", url: "https://www.suse.com/security/cve/CVE-2022-29901/", }, { category: "self", summary: "SUSE CVE CVE-2022-29968 page", url: "https://www.suse.com/security/cve/CVE-2022-29968/", }, { category: "self", summary: "SUSE CVE CVE-2022-3424 page", url: "https://www.suse.com/security/cve/CVE-2022-3424/", }, { category: "self", summary: "SUSE CVE CVE-2022-34918 page", url: "https://www.suse.com/security/cve/CVE-2022-34918/", }, { category: "self", summary: "SUSE CVE CVE-2022-3628 page", url: "https://www.suse.com/security/cve/CVE-2022-3628/", }, { category: "self", summary: "SUSE CVE CVE-2022-3640 page", url: "https://www.suse.com/security/cve/CVE-2022-3640/", }, { category: "self", summary: "SUSE CVE CVE-2022-40982 page", url: "https://www.suse.com/security/cve/CVE-2022-40982/", }, { category: "self", summary: "SUSE CVE CVE-2022-41218 page", url: "https://www.suse.com/security/cve/CVE-2022-41218/", }, { category: "self", summary: "SUSE CVE CVE-2022-41674 page", url: "https://www.suse.com/security/cve/CVE-2022-41674/", }, { category: "self", summary: "SUSE CVE CVE-2022-42719 page", url: "https://www.suse.com/security/cve/CVE-2022-42719/", }, { category: "self", summary: "SUSE CVE CVE-2022-42720 page", url: "https://www.suse.com/security/cve/CVE-2022-42720/", }, { category: "self", summary: "SUSE CVE CVE-2022-42721 page", url: "https://www.suse.com/security/cve/CVE-2022-42721/", }, { category: "self", summary: "SUSE CVE CVE-2022-42722 page", url: "https://www.suse.com/security/cve/CVE-2022-42722/", }, { category: "self", summary: "SUSE CVE CVE-2022-4379 page", url: "https://www.suse.com/security/cve/CVE-2022-4379/", }, { category: "self", summary: "SUSE CVE CVE-2022-44032 page", url: "https://www.suse.com/security/cve/CVE-2022-44032/", }, { category: "self", summary: "SUSE CVE CVE-2022-44033 page", url: "https://www.suse.com/security/cve/CVE-2022-44033/", }, { category: "self", summary: "SUSE CVE CVE-2022-44034 page", url: "https://www.suse.com/security/cve/CVE-2022-44034/", }, { category: "self", summary: "SUSE CVE CVE-2022-45884 page", url: "https://www.suse.com/security/cve/CVE-2022-45884/", }, { category: "self", summary: "SUSE CVE CVE-2022-45885 page", url: "https://www.suse.com/security/cve/CVE-2022-45885/", }, { category: "self", summary: "SUSE CVE CVE-2022-45886 page", url: "https://www.suse.com/security/cve/CVE-2022-45886/", }, { category: "self", summary: "SUSE CVE CVE-2022-45887 page", url: "https://www.suse.com/security/cve/CVE-2022-45887/", }, { category: "self", summary: "SUSE CVE CVE-2022-45888 page", url: "https://www.suse.com/security/cve/CVE-2022-45888/", }, { category: "self", summary: "SUSE CVE CVE-2022-45919 page", url: "https://www.suse.com/security/cve/CVE-2022-45919/", }, { category: "self", summary: "SUSE CVE CVE-2022-45934 page", url: "https://www.suse.com/security/cve/CVE-2022-45934/", }, { category: "self", summary: "SUSE CVE CVE-2023-0045 page", url: "https://www.suse.com/security/cve/CVE-2023-0045/", }, { category: "self", summary: "SUSE CVE CVE-2023-1076 page", url: "https://www.suse.com/security/cve/CVE-2023-1076/", }, { category: "self", summary: "SUSE CVE CVE-2023-1078 page", url: "https://www.suse.com/security/cve/CVE-2023-1078/", }, { category: "self", summary: "SUSE CVE CVE-2023-1192 page", url: "https://www.suse.com/security/cve/CVE-2023-1192/", }, { category: "self", summary: "SUSE CVE CVE-2023-1380 page", url: "https://www.suse.com/security/cve/CVE-2023-1380/", }, { category: "self", summary: "SUSE CVE CVE-2023-20569 page", url: "https://www.suse.com/security/cve/CVE-2023-20569/", }, { category: "self", summary: "SUSE CVE CVE-2023-20593 page", url: "https://www.suse.com/security/cve/CVE-2023-20593/", }, { category: "self", summary: "SUSE CVE CVE-2023-2124 page", url: "https://www.suse.com/security/cve/CVE-2023-2124/", }, { category: "self", summary: "SUSE CVE CVE-2023-31084 page", url: "https://www.suse.com/security/cve/CVE-2023-31084/", }, { category: "self", summary: "SUSE CVE CVE-2023-3141 page", url: "https://www.suse.com/security/cve/CVE-2023-3141/", }, { category: "self", summary: "SUSE CVE CVE-2023-3269 page", url: "https://www.suse.com/security/cve/CVE-2023-3269/", }, { category: "self", summary: "SUSE CVE CVE-2023-39192 page", url: "https://www.suse.com/security/cve/CVE-2023-39192/", }, { category: "self", summary: "SUSE CVE CVE-2023-39193 page", url: "https://www.suse.com/security/cve/CVE-2023-39193/", }, { category: "self", summary: "SUSE CVE CVE-2023-4128 page", url: "https://www.suse.com/security/cve/CVE-2023-4128/", }, { category: "self", summary: "SUSE CVE CVE-2023-4134 page", url: "https://www.suse.com/security/cve/CVE-2023-4134/", }, { category: "self", summary: "SUSE CVE CVE-2023-4194 page", url: "https://www.suse.com/security/cve/CVE-2023-4194/", }, { category: "self", summary: "SUSE CVE CVE-2023-42753 page", url: "https://www.suse.com/security/cve/CVE-2023-42753/", }, { category: "self", summary: "SUSE CVE CVE-2023-42754 page", url: "https://www.suse.com/security/cve/CVE-2023-42754/", }, { category: "self", summary: "SUSE CVE CVE-2023-42756 page", url: "https://www.suse.com/security/cve/CVE-2023-42756/", }, { category: "self", summary: "SUSE CVE CVE-2023-4623 page", url: "https://www.suse.com/security/cve/CVE-2023-4623/", }, { category: "self", summary: "SUSE CVE CVE-2023-46813 page", url: "https://www.suse.com/security/cve/CVE-2023-46813/", }, { category: "self", summary: "SUSE CVE CVE-2023-4881 page", url: "https://www.suse.com/security/cve/CVE-2023-4881/", }, { category: "self", summary: "SUSE CVE CVE-2023-5345 page", url: "https://www.suse.com/security/cve/CVE-2023-5345/", }, { category: "self", summary: "SUSE CVE CVE-2023-6606 page", url: "https://www.suse.com/security/cve/CVE-2023-6606/", }, { category: "self", summary: "SUSE CVE CVE-2023-6610 page", url: "https://www.suse.com/security/cve/CVE-2023-6610/", }, ], title: "kernel-devel-longterm-6.6.17-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:13704-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-longterm-6.6.17-1.1.aarch64", product: { name: "kernel-devel-longterm-6.6.17-1.1.aarch64", product_id: "kernel-devel-longterm-6.6.17-1.1.aarch64", }, }, { category: "product_version", name: "kernel-source-longterm-6.6.17-1.1.aarch64", product: { name: "kernel-source-longterm-6.6.17-1.1.aarch64", product_id: "kernel-source-longterm-6.6.17-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-longterm-6.6.17-1.1.ppc64le", product: { name: "kernel-devel-longterm-6.6.17-1.1.ppc64le", product_id: "kernel-devel-longterm-6.6.17-1.1.ppc64le", }, }, { category: "product_version", name: "kernel-source-longterm-6.6.17-1.1.ppc64le", product: { name: "kernel-source-longterm-6.6.17-1.1.ppc64le", product_id: "kernel-source-longterm-6.6.17-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-devel-longterm-6.6.17-1.1.s390x", product: { name: "kernel-devel-longterm-6.6.17-1.1.s390x", product_id: "kernel-devel-longterm-6.6.17-1.1.s390x", }, }, { category: "product_version", name: "kernel-source-longterm-6.6.17-1.1.s390x", product: { name: "kernel-source-longterm-6.6.17-1.1.s390x", product_id: "kernel-source-longterm-6.6.17-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-devel-longterm-6.6.17-1.1.x86_64", product: { name: "kernel-devel-longterm-6.6.17-1.1.x86_64", product_id: "kernel-devel-longterm-6.6.17-1.1.x86_64", }, }, { category: "product_version", name: "kernel-source-longterm-6.6.17-1.1.x86_64", product: { name: "kernel-source-longterm-6.6.17-1.1.x86_64", product_id: "kernel-source-longterm-6.6.17-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", }, product_reference: "kernel-devel-longterm-6.6.17-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", }, product_reference: "kernel-devel-longterm-6.6.17-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", }, product_reference: "kernel-devel-longterm-6.6.17-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", }, product_reference: "kernel-devel-longterm-6.6.17-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", }, product_reference: "kernel-source-longterm-6.6.17-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", }, product_reference: "kernel-source-longterm-6.6.17-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", }, product_reference: "kernel-source-longterm-6.6.17-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", }, product_reference: "kernel-source-longterm-6.6.17-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2017-1000251", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000251", }, ], notes: [ { category: "general", text: "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000251", url: "https://www.suse.com/security/cve/CVE-2017-1000251", }, { category: "external", summary: "SUSE Bug 1057389 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1057389", }, { category: "external", summary: "SUSE Bug 1057950 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1057950", }, { category: "external", summary: "SUSE Bug 1070535 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1070535", }, { category: "external", summary: "SUSE Bug 1072117 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1072117", }, { category: "external", summary: "SUSE Bug 1072162 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1072162", }, { category: "external", summary: "SUSE Bug 1120758 for CVE-2017-1000251", url: "https://bugzilla.suse.com/1120758", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-1000251", }, { cve: "CVE-2017-12153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12153", }, ], notes: [ { category: "general", text: "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12153", url: "https://www.suse.com/security/cve/CVE-2017-12153", }, { category: "external", summary: "SUSE Bug 1058410 for CVE-2017-12153", url: "https://bugzilla.suse.com/1058410", }, { category: "external", summary: "SUSE Bug 1058624 for CVE-2017-12153", url: "https://bugzilla.suse.com/1058624", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-12153", }, { cve: "CVE-2017-13080", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-13080", }, ], notes: [ { category: "general", text: "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-13080", url: "https://www.suse.com/security/cve/CVE-2017-13080", }, { category: "external", summary: "SUSE Bug 1056061 for CVE-2017-13080", url: "https://bugzilla.suse.com/1056061", }, { category: "external", summary: "SUSE Bug 1063479 for CVE-2017-13080", url: "https://bugzilla.suse.com/1063479", }, { category: "external", summary: "SUSE Bug 1063667 for CVE-2017-13080", url: "https://bugzilla.suse.com/1063667", }, { category: "external", summary: "SUSE Bug 1063671 for CVE-2017-13080", url: "https://bugzilla.suse.com/1063671", }, { category: "external", summary: "SUSE Bug 1066295 for CVE-2017-13080", url: "https://bugzilla.suse.com/1066295", }, { category: "external", summary: "SUSE Bug 1105108 for CVE-2017-13080", url: "https://bugzilla.suse.com/1105108", }, { category: "external", summary: "SUSE Bug 1178872 for CVE-2017-13080", url: "https://bugzilla.suse.com/1178872", }, { category: "external", summary: "SUSE Bug 1179588 for CVE-2017-13080", url: "https://bugzilla.suse.com/1179588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-13080", }, { cve: "CVE-2017-14051", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-14051", }, ], notes: [ { category: "general", text: "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-14051", url: "https://www.suse.com/security/cve/CVE-2017-14051", }, { category: "external", summary: "SUSE Bug 1056588 for CVE-2017-14051", url: "https://bugzilla.suse.com/1056588", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-14051", }, { cve: "CVE-2017-15129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15129", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15129", url: "https://www.suse.com/security/cve/CVE-2017-15129", }, { category: "external", summary: "SUSE Bug 1074839 for CVE-2017-15129", url: "https://bugzilla.suse.com/1074839", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15129", }, { cve: "CVE-2017-15265", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15265", }, ], notes: [ { category: "general", text: "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15265", url: "https://www.suse.com/security/cve/CVE-2017-15265", }, { category: "external", summary: "SUSE Bug 1062520 for CVE-2017-15265", url: "https://bugzilla.suse.com/1062520", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-15265", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15265", }, { cve: "CVE-2017-16536", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16536", }, ], notes: [ { category: "general", text: "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16536", url: "https://www.suse.com/security/cve/CVE-2017-16536", }, { category: "external", summary: "SUSE Bug 1066606 for CVE-2017-16536", url: "https://bugzilla.suse.com/1066606", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16536", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16536", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16536", }, { cve: "CVE-2017-16537", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16537", }, ], notes: [ { category: "general", text: "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16537", url: "https://www.suse.com/security/cve/CVE-2017-16537", }, { category: "external", summary: "SUSE Bug 1066573 for CVE-2017-16537", url: "https://bugzilla.suse.com/1066573", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16537", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16537", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16537", }, { cve: "CVE-2017-16645", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16645", }, ], notes: [ { category: "general", text: "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16645", url: "https://www.suse.com/security/cve/CVE-2017-16645", }, { category: "external", summary: "SUSE Bug 1067132 for CVE-2017-16645", url: "https://bugzilla.suse.com/1067132", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16645", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16645", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16645", }, { cve: "CVE-2017-16646", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16646", }, ], notes: [ { category: "general", text: "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16646", url: "https://www.suse.com/security/cve/CVE-2017-16646", }, { category: "external", summary: "SUSE Bug 1067105 for CVE-2017-16646", url: "https://bugzilla.suse.com/1067105", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16646", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16646", }, { cve: "CVE-2017-16647", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16647", }, ], notes: [ { category: "general", text: "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16647", url: "https://www.suse.com/security/cve/CVE-2017-16647", }, { category: "external", summary: "SUSE Bug 1067102 for CVE-2017-16647", url: "https://bugzilla.suse.com/1067102", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16647", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16647", }, { cve: "CVE-2017-16648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16648", }, ], notes: [ { category: "general", text: "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16648", url: "https://www.suse.com/security/cve/CVE-2017-16648", }, { category: "external", summary: "SUSE Bug 1067087 for CVE-2017-16648", url: "https://bugzilla.suse.com/1067087", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-16648", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2017-16648", url: "https://bugzilla.suse.com/1146519", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16648", }, { cve: "CVE-2017-16995", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16995", }, ], notes: [ { category: "general", text: "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16995", url: "https://www.suse.com/security/cve/CVE-2017-16995", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-16995", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16995", }, { cve: "CVE-2017-16996", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16996", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16996", url: "https://www.suse.com/security/cve/CVE-2017-16996", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-16996", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-16996", }, { cve: "CVE-2017-17448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17448", }, ], notes: [ { category: "general", text: "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17448", url: "https://www.suse.com/security/cve/CVE-2017-17448", }, { category: "external", summary: "SUSE Bug 1071693 for CVE-2017-17448", url: "https://bugzilla.suse.com/1071693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17448", }, { cve: "CVE-2017-17449", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17449", }, ], notes: [ { category: "general", text: "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17449", url: "https://www.suse.com/security/cve/CVE-2017-17449", }, { category: "external", summary: "SUSE Bug 1071694 for CVE-2017-17449", url: "https://bugzilla.suse.com/1071694", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17449", }, { cve: "CVE-2017-17450", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17450", }, ], notes: [ { category: "general", text: "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17450", url: "https://www.suse.com/security/cve/CVE-2017-17450", }, { category: "external", summary: "SUSE Bug 1071695 for CVE-2017-17450", url: "https://bugzilla.suse.com/1071695", }, { category: "external", summary: "SUSE Bug 1074033 for CVE-2017-17450", url: "https://bugzilla.suse.com/1074033", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-17450", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17450", }, { cve: "CVE-2017-17852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17852", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17852", url: "https://www.suse.com/security/cve/CVE-2017-17852", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17852", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17852", }, { cve: "CVE-2017-17853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17853", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17853", url: "https://www.suse.com/security/cve/CVE-2017-17853", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17853", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17853", }, { cve: "CVE-2017-17854", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17854", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17854", url: "https://www.suse.com/security/cve/CVE-2017-17854", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17854", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17854", }, { cve: "CVE-2017-17855", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17855", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17855", url: "https://www.suse.com/security/cve/CVE-2017-17855", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17855", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17855", }, { cve: "CVE-2017-17856", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17856", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17856", url: "https://www.suse.com/security/cve/CVE-2017-17856", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17856", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17856", }, { cve: "CVE-2017-17857", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17857", }, ], notes: [ { category: "general", text: "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17857", url: "https://www.suse.com/security/cve/CVE-2017-17857", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17857", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17857", }, { cve: "CVE-2017-17862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17862", }, ], notes: [ { category: "general", text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17862", url: "https://www.suse.com/security/cve/CVE-2017-17862", }, { category: "external", summary: "SUSE Bug 1073928 for CVE-2017-17862", url: "https://bugzilla.suse.com/1073928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-17862", }, { cve: "CVE-2017-5123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5123", }, ], notes: [ { category: "general", text: "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5123", url: "https://www.suse.com/security/cve/CVE-2017-5123", }, { category: "external", summary: "SUSE Bug 1062473 for CVE-2017-5123", url: "https://bugzilla.suse.com/1062473", }, { category: "external", summary: "SUSE Bug 1122971 for CVE-2017-5123", url: "https://bugzilla.suse.com/1122971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5123", }, { cve: "CVE-2017-5715", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5715", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5715", url: "https://www.suse.com/security/cve/CVE-2017-5715", }, { category: "external", summary: "SUSE Bug 1068032 for CVE-2017-5715", url: "https://bugzilla.suse.com/1068032", }, { category: "external", summary: "SUSE Bug 1074562 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074562", }, { category: "external", summary: "SUSE Bug 1074578 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074578", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1074741 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074741", }, { category: "external", summary: "SUSE Bug 1074919 for CVE-2017-5715", url: "https://bugzilla.suse.com/1074919", }, { category: "external", summary: "SUSE Bug 1075006 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075006", }, { category: "external", summary: "SUSE Bug 1075007 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075007", }, { category: "external", summary: "SUSE Bug 1075262 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075262", }, { category: "external", summary: "SUSE Bug 1075419 for CVE-2017-5715", url: "https://bugzilla.suse.com/1075419", }, { category: "external", summary: "SUSE Bug 1076115 for CVE-2017-5715", url: "https://bugzilla.suse.com/1076115", }, { category: "external", summary: "SUSE Bug 1076372 for CVE-2017-5715", url: "https://bugzilla.suse.com/1076372", }, { category: "external", summary: "SUSE Bug 1076606 for CVE-2017-5715", url: "https://bugzilla.suse.com/1076606", }, { category: "external", summary: "SUSE Bug 1078353 for CVE-2017-5715", url: "https://bugzilla.suse.com/1078353", }, { category: "external", summary: "SUSE Bug 1080039 for CVE-2017-5715", url: "https://bugzilla.suse.com/1080039", }, { category: "external", summary: "SUSE Bug 1087887 for CVE-2017-5715", url: "https://bugzilla.suse.com/1087887", }, { category: "external", summary: "SUSE Bug 1087939 for CVE-2017-5715", url: "https://bugzilla.suse.com/1087939", }, { category: "external", summary: "SUSE Bug 1088147 for CVE-2017-5715", url: "https://bugzilla.suse.com/1088147", }, { category: "external", summary: "SUSE Bug 1089055 for CVE-2017-5715", url: "https://bugzilla.suse.com/1089055", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2017-5715", url: "https://bugzilla.suse.com/1091815", }, { category: "external", summary: "SUSE Bug 1095735 for CVE-2017-5715", url: "https://bugzilla.suse.com/1095735", }, { category: "external", summary: "SUSE Bug 1102517 for CVE-2017-5715", url: "https://bugzilla.suse.com/1102517", }, { category: "external", summary: "SUSE Bug 1105108 for CVE-2017-5715", url: "https://bugzilla.suse.com/1105108", }, { category: "external", summary: "SUSE Bug 1126516 for CVE-2017-5715", url: "https://bugzilla.suse.com/1126516", }, { category: "external", summary: "SUSE Bug 1173489 for CVE-2017-5715", url: "https://bugzilla.suse.com/1173489", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-5715", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201457 for CVE-2017-5715", url: "https://bugzilla.suse.com/1201457", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2017-5715", url: "https://bugzilla.suse.com/1201877", }, { category: "external", summary: "SUSE Bug 1203236 for CVE-2017-5715", url: "https://bugzilla.suse.com/1203236", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5715", }, { cve: "CVE-2017-5753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5753", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5753", url: "https://www.suse.com/security/cve/CVE-2017-5753", }, { category: "external", summary: "SUSE Bug 1068032 for CVE-2017-5753", url: "https://bugzilla.suse.com/1068032", }, { category: "external", summary: "SUSE Bug 1074562 for CVE-2017-5753", url: "https://bugzilla.suse.com/1074562", }, { category: "external", summary: "SUSE Bug 1074578 for CVE-2017-5753", url: "https://bugzilla.suse.com/1074578", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2017-5753", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1075006 for CVE-2017-5753", url: "https://bugzilla.suse.com/1075006", }, { category: "external", summary: "SUSE Bug 1075419 for CVE-2017-5753", url: "https://bugzilla.suse.com/1075419", }, { category: "external", summary: "SUSE Bug 1075748 for CVE-2017-5753", url: "https://bugzilla.suse.com/1075748", }, { category: "external", summary: "SUSE Bug 1080039 for CVE-2017-5753", url: "https://bugzilla.suse.com/1080039", }, { category: "external", summary: "SUSE Bug 1087084 for CVE-2017-5753", url: "https://bugzilla.suse.com/1087084", }, { category: "external", summary: "SUSE Bug 1087939 for CVE-2017-5753", url: "https://bugzilla.suse.com/1087939", }, { category: "external", summary: "SUSE Bug 1089055 for CVE-2017-5753", url: "https://bugzilla.suse.com/1089055", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2017-5753", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-5753", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2017-5753", url: "https://bugzilla.suse.com/1201877", }, { category: "external", summary: "SUSE Bug 1209547 for CVE-2017-5753", url: "https://bugzilla.suse.com/1209547", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5753", }, { cve: "CVE-2017-5754", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5754", }, ], notes: [ { category: "general", text: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-5754", url: "https://www.suse.com/security/cve/CVE-2017-5754", }, { category: "external", summary: "SUSE Bug 1068032 for CVE-2017-5754", url: "https://bugzilla.suse.com/1068032", }, { category: "external", summary: "SUSE Bug 1074562 for CVE-2017-5754", url: "https://bugzilla.suse.com/1074562", }, { category: "external", summary: "SUSE Bug 1074578 for CVE-2017-5754", url: "https://bugzilla.suse.com/1074578", }, { category: "external", summary: "SUSE Bug 1074701 for CVE-2017-5754", url: "https://bugzilla.suse.com/1074701", }, { category: "external", summary: "SUSE Bug 1075006 for CVE-2017-5754", url: "https://bugzilla.suse.com/1075006", }, { category: "external", summary: "SUSE Bug 1075008 for CVE-2017-5754", url: "https://bugzilla.suse.com/1075008", }, { category: "external", summary: "SUSE Bug 1087939 for CVE-2017-5754", url: "https://bugzilla.suse.com/1087939", }, { category: "external", summary: "SUSE Bug 1089055 for CVE-2017-5754", url: "https://bugzilla.suse.com/1089055", }, { category: "external", summary: "SUSE Bug 1115045 for CVE-2017-5754", url: "https://bugzilla.suse.com/1115045", }, { category: "external", summary: "SUSE Bug 1136865 for CVE-2017-5754", url: "https://bugzilla.suse.com/1136865", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-5754", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2017-5754", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-5754", }, { cve: "CVE-2017-7541", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7541", }, ], notes: [ { category: "general", text: "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7541", url: "https://www.suse.com/security/cve/CVE-2017-7541", }, { category: "external", summary: "SUSE Bug 1049645 for CVE-2017-7541", url: "https://bugzilla.suse.com/1049645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7541", }, { cve: "CVE-2017-7542", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7542", }, ], notes: [ { category: "general", text: "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7542", url: "https://www.suse.com/security/cve/CVE-2017-7542", }, { category: "external", summary: "SUSE Bug 1049882 for CVE-2017-7542", url: "https://bugzilla.suse.com/1049882", }, { category: "external", summary: "SUSE Bug 1061936 for CVE-2017-7542", url: "https://bugzilla.suse.com/1061936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-7542", }, { cve: "CVE-2017-8824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8824", }, ], notes: [ { category: "general", text: "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8824", url: "https://www.suse.com/security/cve/CVE-2017-8824", }, { category: "external", summary: "SUSE Bug 1070771 for CVE-2017-8824", url: "https://bugzilla.suse.com/1070771", }, { category: "external", summary: "SUSE Bug 1076734 for CVE-2017-8824", url: "https://bugzilla.suse.com/1076734", }, { category: "external", summary: "SUSE Bug 1092904 for CVE-2017-8824", url: "https://bugzilla.suse.com/1092904", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-8824", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-8824", }, { cve: "CVE-2017-8831", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8831", }, ], notes: [ { category: "general", text: "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8831", url: "https://www.suse.com/security/cve/CVE-2017-8831", }, { category: "external", summary: "SUSE Bug 1037994 for CVE-2017-8831", url: "https://bugzilla.suse.com/1037994", }, { category: "external", summary: "SUSE Bug 1061936 for CVE-2017-8831", url: "https://bugzilla.suse.com/1061936", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2017-8831", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2017-8831", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-8831", }, { cve: "CVE-2018-1000004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000004", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000004", url: "https://www.suse.com/security/cve/CVE-2018-1000004", }, { category: "external", summary: "SUSE Bug 1076017 for CVE-2018-1000004", url: "https://bugzilla.suse.com/1076017", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-1000004", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000004", }, { cve: "CVE-2018-10322", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10322", }, ], notes: [ { category: "general", text: "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10322", url: "https://www.suse.com/security/cve/CVE-2018-10322", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10322", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1090749 for CVE-2018-10322", url: "https://bugzilla.suse.com/1090749", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-10322", }, { cve: "CVE-2018-10323", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10323", }, ], notes: [ { category: "general", text: "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10323", url: "https://www.suse.com/security/cve/CVE-2018-10323", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-10323", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1090717 for CVE-2018-10323", url: "https://bugzilla.suse.com/1090717", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-10323", }, { cve: "CVE-2018-1068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1068", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1068", url: "https://www.suse.com/security/cve/CVE-2018-1068", }, { category: "external", summary: "SUSE Bug 1085107 for CVE-2018-1068", url: "https://bugzilla.suse.com/1085107", }, { category: "external", summary: "SUSE Bug 1085114 for CVE-2018-1068", url: "https://bugzilla.suse.com/1085114", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1068", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1123903 for CVE-2018-1068", url: "https://bugzilla.suse.com/1123903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-1068", }, { cve: "CVE-2018-1118", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1118", }, ], notes: [ { category: "general", text: "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1118", url: "https://www.suse.com/security/cve/CVE-2018-1118", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-1118", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1092472 for CVE-2018-1118", url: "https://bugzilla.suse.com/1092472", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1118", }, { cve: "CVE-2018-12232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12232", }, ], notes: [ { category: "general", text: "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12232", url: "https://www.suse.com/security/cve/CVE-2018-12232", }, { category: "external", summary: "SUSE Bug 1087082 for CVE-2018-12232", url: "https://bugzilla.suse.com/1087082", }, { category: "external", summary: "SUSE Bug 1097593 for CVE-2018-12232", url: "https://bugzilla.suse.com/1097593", }, { category: "external", summary: "SUSE Bug 1125907 for CVE-2018-12232", url: "https://bugzilla.suse.com/1125907", }, { category: "external", summary: "SUSE Bug 1127757 for CVE-2018-12232", url: "https://bugzilla.suse.com/1127757", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-12232", }, { cve: "CVE-2018-12714", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12714", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12714", url: "https://www.suse.com/security/cve/CVE-2018-12714", }, { category: "external", summary: "SUSE Bug 1098933 for CVE-2018-12714", url: "https://bugzilla.suse.com/1098933", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-12714", }, { cve: "CVE-2018-13053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-13053", }, ], notes: [ { category: "general", text: "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-13053", url: "https://www.suse.com/security/cve/CVE-2018-13053", }, { category: "external", summary: "SUSE Bug 1099924 for CVE-2018-13053", url: "https://bugzilla.suse.com/1099924", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-13053", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-13053", }, { cve: "CVE-2018-18710", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-18710", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-18710", url: "https://www.suse.com/security/cve/CVE-2018-18710", }, { category: "external", summary: "SUSE Bug 1113751 for CVE-2018-18710", url: "https://bugzilla.suse.com/1113751", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-18710", }, { cve: "CVE-2018-19824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-19824", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-19824", url: "https://www.suse.com/security/cve/CVE-2018-19824", }, { category: "external", summary: "SUSE Bug 1118152 for CVE-2018-19824", url: "https://bugzilla.suse.com/1118152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-19824", }, { cve: "CVE-2018-5332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5332", }, ], notes: [ { category: "general", text: "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5332", url: "https://www.suse.com/security/cve/CVE-2018-5332", }, { category: "external", summary: "SUSE Bug 1075621 for CVE-2018-5332", url: "https://bugzilla.suse.com/1075621", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-5332", url: "https://bugzilla.suse.com/1091815", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2018-5332", url: "https://bugzilla.suse.com/1115893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-5332", }, { cve: "CVE-2018-5333", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5333", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5333", url: "https://www.suse.com/security/cve/CVE-2018-5333", }, { category: "external", summary: "SUSE Bug 1075617 for CVE-2018-5333", url: "https://bugzilla.suse.com/1075617", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-5333", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-5333", }, { cve: "CVE-2018-8043", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8043", }, ], notes: [ { category: "general", text: "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8043", url: "https://www.suse.com/security/cve/CVE-2018-8043", }, { category: "external", summary: "SUSE Bug 1084829 for CVE-2018-8043", url: "https://bugzilla.suse.com/1084829", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-8043", }, { cve: "CVE-2018-8087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8087", }, ], notes: [ { category: "general", text: "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8087", url: "https://www.suse.com/security/cve/CVE-2018-8087", }, { category: "external", summary: "SUSE Bug 1085053 for CVE-2018-8087", url: "https://bugzilla.suse.com/1085053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-8087", }, { cve: "CVE-2018-8822", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8822", }, ], notes: [ { category: "general", text: "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8822", url: "https://www.suse.com/security/cve/CVE-2018-8822", }, { category: "external", summary: "SUSE Bug 1086162 for CVE-2018-8822", url: "https://bugzilla.suse.com/1086162", }, { category: "external", summary: "SUSE Bug 1090404 for CVE-2018-8822", url: "https://bugzilla.suse.com/1090404", }, { category: "external", summary: "SUSE Bug 1091815 for CVE-2018-8822", url: "https://bugzilla.suse.com/1091815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-8822", }, { cve: "CVE-2019-10207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-10207", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-10207", url: "https://www.suse.com/security/cve/CVE-2019-10207", }, { category: "external", summary: "SUSE Bug 1123959 for CVE-2019-10207", url: "https://bugzilla.suse.com/1123959", }, { category: "external", summary: "SUSE Bug 1142857 for CVE-2019-10207", url: "https://bugzilla.suse.com/1142857", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-10207", }, { cve: "CVE-2019-11477", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11477", }, ], notes: [ { category: "general", text: "Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11477", url: "https://www.suse.com/security/cve/CVE-2019-11477", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11477", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1137586 for CVE-2019-11477", url: "https://bugzilla.suse.com/1137586", }, { category: "external", summary: "SUSE Bug 1142129 for CVE-2019-11477", url: "https://bugzilla.suse.com/1142129", }, { category: "external", summary: "SUSE Bug 1153242 for CVE-2019-11477", url: "https://bugzilla.suse.com/1153242", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-11477", }, { cve: "CVE-2019-11478", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11478", }, ], notes: [ { category: "general", text: "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11478", url: "https://www.suse.com/security/cve/CVE-2019-11478", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11478", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1137586 for CVE-2019-11478", url: "https://bugzilla.suse.com/1137586", }, { category: "external", summary: "SUSE Bug 1142129 for CVE-2019-11478", url: "https://bugzilla.suse.com/1142129", }, { category: "external", summary: "SUSE Bug 1143542 for CVE-2019-11478", url: "https://bugzilla.suse.com/1143542", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-11478", }, { cve: "CVE-2019-11479", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-11479", }, ], notes: [ { category: "general", text: "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-11479", url: "https://www.suse.com/security/cve/CVE-2019-11479", }, { category: "external", summary: "SUSE Bug 1132686 for CVE-2019-11479", url: "https://bugzilla.suse.com/1132686", }, { category: "external", summary: "SUSE Bug 1137586 for CVE-2019-11479", url: "https://bugzilla.suse.com/1137586", }, { category: "external", summary: "SUSE Bug 1142129 for CVE-2019-11479", url: "https://bugzilla.suse.com/1142129", }, { category: "external", summary: "SUSE Bug 1143542 for CVE-2019-11479", url: "https://bugzilla.suse.com/1143542", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-11479", }, { cve: "CVE-2019-14615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14615", }, ], notes: [ { category: "general", text: "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14615", url: "https://www.suse.com/security/cve/CVE-2019-14615", }, { category: "external", summary: "SUSE Bug 1160195 for CVE-2019-14615", url: "https://bugzilla.suse.com/1160195", }, { category: "external", summary: "SUSE Bug 1165881 for CVE-2019-14615", url: "https://bugzilla.suse.com/1165881", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-14615", }, { cve: "CVE-2019-14814", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14814", }, ], notes: [ { category: "general", text: "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14814", url: "https://www.suse.com/security/cve/CVE-2019-14814", }, { category: "external", summary: "SUSE Bug 1146512 for CVE-2019-14814", url: "https://bugzilla.suse.com/1146512", }, { category: "external", summary: "SUSE Bug 1173664 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173664", }, { category: "external", summary: "SUSE Bug 1173665 for CVE-2019-14814", url: "https://bugzilla.suse.com/1173665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-14814", }, { cve: "CVE-2019-14896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14896", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14896", url: "https://www.suse.com/security/cve/CVE-2019-14896", }, { category: "external", summary: "SUSE Bug 1157157 for CVE-2019-14896", url: "https://bugzilla.suse.com/1157157", }, { category: "external", summary: "SUSE Bug 1160468 for CVE-2019-14896", url: "https://bugzilla.suse.com/1160468", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-14896", }, { cve: "CVE-2019-15030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15030", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15030", url: "https://www.suse.com/security/cve/CVE-2019-15030", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15030", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15030", }, { cve: "CVE-2019-15031", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15031", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15031", url: "https://www.suse.com/security/cve/CVE-2019-15031", }, { category: "external", summary: "SUSE Bug 1149713 for CVE-2019-15031", url: "https://bugzilla.suse.com/1149713", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15031", }, { cve: "CVE-2019-15098", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15098", }, ], notes: [ { category: "general", text: "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15098", url: "https://www.suse.com/security/cve/CVE-2019-15098", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15098", url: "https://bugzilla.suse.com/1146543", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15098", }, { cve: "CVE-2019-15099", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15099", }, ], notes: [ { category: "general", text: "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15099", url: "https://www.suse.com/security/cve/CVE-2019-15099", }, { category: "external", summary: "SUSE Bug 1146368 for CVE-2019-15099", url: "https://bugzilla.suse.com/1146368", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15099", }, { cve: "CVE-2019-15290", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15290", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15290", url: "https://www.suse.com/security/cve/CVE-2019-15290", }, { category: "external", summary: "SUSE Bug 1146378 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146378", }, { category: "external", summary: "SUSE Bug 1146519 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146519", }, { category: "external", summary: "SUSE Bug 1146543 for CVE-2019-15290", url: "https://bugzilla.suse.com/1146543", }, { category: "external", summary: "SUSE Bug 1158381 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158381", }, { category: "external", summary: "SUSE Bug 1158834 for CVE-2019-15290", url: "https://bugzilla.suse.com/1158834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15290", }, { cve: "CVE-2019-15504", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15504", }, ], notes: [ { category: "general", text: "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15504", url: "https://www.suse.com/security/cve/CVE-2019-15504", }, { category: "external", summary: "SUSE Bug 1147116 for CVE-2019-15504", url: "https://bugzilla.suse.com/1147116", }, { category: "external", summary: "SUSE Bug 1185852 for CVE-2019-15504", url: "https://bugzilla.suse.com/1185852", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-15504", }, { cve: "CVE-2019-15902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15902", }, ], notes: [ { category: "general", text: "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15902", url: "https://www.suse.com/security/cve/CVE-2019-15902", }, { category: "external", summary: "SUSE Bug 1149376 for CVE-2019-15902", url: "https://bugzilla.suse.com/1149376", }, { category: "external", summary: "SUSE Bug 1155131 for CVE-2019-15902", url: "https://bugzilla.suse.com/1155131", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-15902", }, { cve: "CVE-2019-16231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16231", }, ], notes: [ { category: "general", text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16231", url: "https://www.suse.com/security/cve/CVE-2019-16231", }, { category: "external", summary: "SUSE Bug 1150466 for CVE-2019-16231", url: "https://bugzilla.suse.com/1150466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-16231", }, { cve: "CVE-2019-16232", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16232", }, ], notes: [ { category: "general", text: "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16232", url: "https://www.suse.com/security/cve/CVE-2019-16232", }, { category: "external", summary: "SUSE Bug 1150465 for CVE-2019-16232", url: "https://bugzilla.suse.com/1150465", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-16232", }, { cve: "CVE-2019-16234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16234", }, ], notes: [ { category: "general", text: "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16234", url: "https://www.suse.com/security/cve/CVE-2019-16234", }, { category: "external", summary: "SUSE Bug 1150452 for CVE-2019-16234", url: "https://bugzilla.suse.com/1150452", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-16234", }, { cve: "CVE-2019-17133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17133", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17133", url: "https://www.suse.com/security/cve/CVE-2019-17133", }, { category: "external", summary: "SUSE Bug 1153158 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153158", }, { category: "external", summary: "SUSE Bug 1153161 for CVE-2019-17133", url: "https://bugzilla.suse.com/1153161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-17133", }, { cve: "CVE-2019-17666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17666", }, ], notes: [ { category: "general", text: "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17666", url: "https://www.suse.com/security/cve/CVE-2019-17666", }, { category: "external", summary: "SUSE Bug 1154372 for CVE-2019-17666", url: "https://bugzilla.suse.com/1154372", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-17666", }, { cve: "CVE-2019-18808", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18808", }, ], notes: [ { category: "general", text: "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18808", url: "https://www.suse.com/security/cve/CVE-2019-18808", }, { category: "external", summary: "SUSE Bug 1156259 for CVE-2019-18808", url: "https://bugzilla.suse.com/1156259", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2019-18808", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2019-18808", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18808", }, { cve: "CVE-2019-18812", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18812", }, ], notes: [ { category: "general", text: "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18812", url: "https://www.suse.com/security/cve/CVE-2019-18812", }, { category: "external", summary: "SUSE Bug 1156277 for CVE-2019-18812", url: "https://bugzilla.suse.com/1156277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18812", }, { cve: "CVE-2019-18813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-18813", }, ], notes: [ { category: "general", text: "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-18813", url: "https://www.suse.com/security/cve/CVE-2019-18813", }, { category: "external", summary: "SUSE Bug 1156278 for CVE-2019-18813", url: "https://bugzilla.suse.com/1156278", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-18813", }, { cve: "CVE-2019-19252", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19252", }, ], notes: [ { category: "general", text: "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19252", url: "https://www.suse.com/security/cve/CVE-2019-19252", }, { category: "external", summary: "SUSE Bug 1157813 for CVE-2019-19252", url: "https://bugzilla.suse.com/1157813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-19252", }, { cve: "CVE-2019-19332", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19332", }, ], notes: [ { category: "general", text: "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19332", url: "https://www.suse.com/security/cve/CVE-2019-19332", }, { category: "external", summary: "SUSE Bug 1158827 for CVE-2019-19332", url: "https://bugzilla.suse.com/1158827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-19332", }, { cve: "CVE-2019-19338", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19338", }, ], notes: [ { category: "general", text: "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19338", url: "https://www.suse.com/security/cve/CVE-2019-19338", }, { category: "external", summary: "SUSE Bug 1158954 for CVE-2019-19338", url: "https://bugzilla.suse.com/1158954", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-19338", }, { cve: "CVE-2019-3016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3016", }, ], notes: [ { category: "general", text: "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3016", url: "https://www.suse.com/security/cve/CVE-2019-3016", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2019-3016", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1161154 for CVE-2019-3016", url: "https://bugzilla.suse.com/1161154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3016", }, { cve: "CVE-2019-3846", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3846", }, ], notes: [ { category: "general", text: "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3846", url: "https://www.suse.com/security/cve/CVE-2019-3846", }, { category: "external", summary: "SUSE Bug 1136424 for CVE-2019-3846", url: "https://bugzilla.suse.com/1136424", }, { category: "external", summary: "SUSE Bug 1136446 for CVE-2019-3846", url: "https://bugzilla.suse.com/1136446", }, { category: "external", summary: "SUSE Bug 1156330 for CVE-2019-3846", url: "https://bugzilla.suse.com/1156330", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-3846", }, { cve: "CVE-2019-3882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3882", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3882", url: "https://www.suse.com/security/cve/CVE-2019-3882", }, { category: "external", summary: "SUSE Bug 1131416 for CVE-2019-3882", url: "https://bugzilla.suse.com/1131416", }, { category: "external", summary: "SUSE Bug 1131427 for CVE-2019-3882", url: "https://bugzilla.suse.com/1131427", }, { category: "external", summary: "SUSE Bug 1133319 for CVE-2019-3882", url: "https://bugzilla.suse.com/1133319", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3882", }, { cve: "CVE-2019-3887", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3887", }, ], notes: [ { category: "general", text: "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3887", url: "https://www.suse.com/security/cve/CVE-2019-3887", }, { category: "external", summary: "SUSE Bug 1131800 for CVE-2019-3887", url: "https://bugzilla.suse.com/1131800", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3887", }, { cve: "CVE-2019-6974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6974", }, ], notes: [ { category: "general", text: "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6974", url: "https://www.suse.com/security/cve/CVE-2019-6974", }, { category: "external", summary: "SUSE Bug 1124728 for CVE-2019-6974", url: "https://bugzilla.suse.com/1124728", }, { category: "external", summary: "SUSE Bug 1124729 for CVE-2019-6974", url: "https://bugzilla.suse.com/1124729", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-6974", }, { cve: "CVE-2019-7221", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7221", }, ], notes: [ { category: "general", text: "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7221", url: "https://www.suse.com/security/cve/CVE-2019-7221", }, { category: "external", summary: "SUSE Bug 1124732 for CVE-2019-7221", url: "https://bugzilla.suse.com/1124732", }, { category: "external", summary: "SUSE Bug 1124734 for CVE-2019-7221", url: "https://bugzilla.suse.com/1124734", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-7221", }, { cve: "CVE-2019-7222", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-7222", }, ], notes: [ { category: "general", text: "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-7222", url: "https://www.suse.com/security/cve/CVE-2019-7222", }, { category: "external", summary: "SUSE Bug 1124735 for CVE-2019-7222", url: "https://bugzilla.suse.com/1124735", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-7222", }, { cve: "CVE-2019-8564", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-8564", }, ], notes: [ { category: "general", text: "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-8564", url: "https://www.suse.com/security/cve/CVE-2019-8564", }, { category: "external", summary: "SUSE Bug 1132673 for CVE-2019-8564", url: "https://bugzilla.suse.com/1132673", }, { category: "external", summary: "SUSE Bug 1132828 for CVE-2019-8564", url: "https://bugzilla.suse.com/1132828", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-8564", }, { cve: "CVE-2019-8912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-8912", }, ], notes: [ { category: "general", text: "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-8912", url: "https://www.suse.com/security/cve/CVE-2019-8912", }, { category: "external", summary: "SUSE Bug 1125907 for CVE-2019-8912", url: "https://bugzilla.suse.com/1125907", }, { category: "external", summary: "SUSE Bug 1126284 for CVE-2019-8912", url: "https://bugzilla.suse.com/1126284", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-8912", }, { cve: "CVE-2019-9500", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-9500", }, ], notes: [ { category: "general", text: "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-9500", url: "https://www.suse.com/security/cve/CVE-2019-9500", }, { category: "external", summary: "SUSE Bug 1132681 for CVE-2019-9500", url: "https://bugzilla.suse.com/1132681", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-9500", }, { cve: "CVE-2020-10135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10135", }, ], notes: [ { category: "general", text: "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10135", url: "https://www.suse.com/security/cve/CVE-2020-10135", }, { category: "external", summary: "SUSE Bug 1171988 for CVE-2020-10135", url: "https://bugzilla.suse.com/1171988", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10135", }, { cve: "CVE-2020-10766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10766", }, ], notes: [ { category: "general", text: "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10766", url: "https://www.suse.com/security/cve/CVE-2020-10766", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10766", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172781 for CVE-2020-10766", url: "https://bugzilla.suse.com/1172781", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10766", }, { cve: "CVE-2020-10767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10767", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10767", url: "https://www.suse.com/security/cve/CVE-2020-10767", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10767", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172782 for CVE-2020-10767", url: "https://bugzilla.suse.com/1172782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10767", }, { cve: "CVE-2020-10768", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10768", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10768", url: "https://www.suse.com/security/cve/CVE-2020-10768", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10768", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172783 for CVE-2020-10768", url: "https://bugzilla.suse.com/1172783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-10768", }, { cve: "CVE-2020-12351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12351", }, ], notes: [ { category: "general", text: "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12351", url: "https://www.suse.com/security/cve/CVE-2020-12351", }, { category: "external", summary: "SUSE Bug 1177724 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177724", }, { category: "external", summary: "SUSE Bug 1177729 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177729", }, { category: "external", summary: "SUSE Bug 1178397 for CVE-2020-12351", url: "https://bugzilla.suse.com/1178397", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-12351", }, { cve: "CVE-2020-12352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12352", }, ], notes: [ { category: "general", text: "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12352", url: "https://www.suse.com/security/cve/CVE-2020-12352", }, { category: "external", summary: "SUSE Bug 1177725 for CVE-2020-12352", url: "https://bugzilla.suse.com/1177725", }, { category: "external", summary: "SUSE Bug 1178398 for CVE-2020-12352", url: "https://bugzilla.suse.com/1178398", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-12352", }, { cve: "CVE-2020-14331", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14331", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14331", url: "https://www.suse.com/security/cve/CVE-2020-14331", }, { category: "external", summary: "SUSE Bug 1174205 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174205", }, { category: "external", summary: "SUSE Bug 1174247 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14331", }, { cve: "CVE-2020-14386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14386", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14386", url: "https://www.suse.com/security/cve/CVE-2020-14386", }, { category: "external", summary: "SUSE Bug 1176069 for CVE-2020-14386", url: "https://bugzilla.suse.com/1176069", }, { category: "external", summary: "SUSE Bug 1176072 for CVE-2020-14386", url: "https://bugzilla.suse.com/1176072", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-14386", }, { cve: "CVE-2020-24586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24586", }, ], notes: [ { category: "general", text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24586", url: "https://www.suse.com/security/cve/CVE-2020-24586", }, { category: "external", summary: "SUSE Bug 1185859 for CVE-2020-24586", url: "https://bugzilla.suse.com/1185859", }, { category: "external", summary: "SUSE Bug 1192868 for CVE-2020-24586", url: "https://bugzilla.suse.com/1192868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-24586", }, { cve: "CVE-2020-24587", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24587", }, ], notes: [ { category: "general", text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24587", url: "https://www.suse.com/security/cve/CVE-2020-24587", }, { category: "external", summary: "SUSE Bug 1185859 for CVE-2020-24587", url: "https://bugzilla.suse.com/1185859", }, { category: "external", summary: "SUSE Bug 1185862 for CVE-2020-24587", url: "https://bugzilla.suse.com/1185862", }, { category: "external", summary: "SUSE Bug 1192868 for CVE-2020-24587", url: "https://bugzilla.suse.com/1192868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-24587", }, { cve: "CVE-2020-24588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24588", }, ], notes: [ { category: "general", text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24588", url: "https://www.suse.com/security/cve/CVE-2020-24588", }, { category: "external", summary: "SUSE Bug 1185861 for CVE-2020-24588", url: "https://bugzilla.suse.com/1185861", }, { category: "external", summary: "SUSE Bug 1192868 for CVE-2020-24588", url: "https://bugzilla.suse.com/1192868", }, { category: "external", summary: "SUSE Bug 1199701 for CVE-2020-24588", url: "https://bugzilla.suse.com/1199701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-24588", }, { cve: "CVE-2020-25639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25639", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25639", url: "https://www.suse.com/security/cve/CVE-2020-25639", }, { category: "external", summary: "SUSE Bug 1176846 for CVE-2020-25639", url: "https://bugzilla.suse.com/1176846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-25639", }, { cve: "CVE-2020-25656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25656", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25656", url: "https://www.suse.com/security/cve/CVE-2020-25656", }, { category: "external", summary: "SUSE Bug 1177766 for CVE-2020-25656", url: "https://bugzilla.suse.com/1177766", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-25656", }, { cve: "CVE-2020-25668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25668", }, ], notes: [ { category: "general", text: "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25668", url: "https://www.suse.com/security/cve/CVE-2020-25668", }, { category: "external", summary: "SUSE Bug 1178123 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178123", }, { category: "external", summary: "SUSE Bug 1178622 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178622", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2020-25668", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-25668", }, { cve: "CVE-2020-26141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-26141", }, ], notes: [ { category: "general", text: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-26141", url: "https://www.suse.com/security/cve/CVE-2020-26141", }, { category: "external", summary: "SUSE Bug 1185987 for CVE-2020-26141", url: "https://bugzilla.suse.com/1185987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-26141", }, { cve: "CVE-2020-2732", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-2732", }, ], notes: [ { category: "general", text: "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-2732", url: "https://www.suse.com/security/cve/CVE-2020-2732", }, { category: "external", summary: "SUSE Bug 1163971 for CVE-2020-2732", url: "https://bugzilla.suse.com/1163971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-2732", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-8648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8648", }, ], notes: [ { category: "general", text: "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8648", url: "https://www.suse.com/security/cve/CVE-2020-8648", }, { category: "external", summary: "SUSE Bug 1162928 for CVE-2020-8648", url: "https://bugzilla.suse.com/1162928", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8648", }, { cve: "CVE-2020-8694", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8694", }, ], notes: [ { category: "general", text: "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8694", url: "https://www.suse.com/security/cve/CVE-2020-8694", }, { category: "external", summary: "SUSE Bug 1170415 for CVE-2020-8694", url: "https://bugzilla.suse.com/1170415", }, { category: "external", summary: "SUSE Bug 1170446 for CVE-2020-8694", url: "https://bugzilla.suse.com/1170446", }, { category: "external", summary: "SUSE Bug 1178591 for CVE-2020-8694", url: "https://bugzilla.suse.com/1178591", }, { category: "external", summary: "SUSE Bug 1178700 for CVE-2020-8694", url: "https://bugzilla.suse.com/1178700", }, { category: "external", summary: "SUSE Bug 1179661 for CVE-2020-8694", url: "https://bugzilla.suse.com/1179661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8694", }, { cve: "CVE-2021-23133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-23133", }, ], notes: [ { category: "general", text: "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-23133", url: "https://www.suse.com/security/cve/CVE-2021-23133", }, { category: "external", summary: "SUSE Bug 1184675 for CVE-2021-23133", url: "https://bugzilla.suse.com/1184675", }, { category: "external", summary: "SUSE Bug 1185901 for CVE-2021-23133", url: "https://bugzilla.suse.com/1185901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-23133", }, { cve: "CVE-2021-26708", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-26708", }, ], notes: [ { category: "general", text: "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-26708", url: "https://www.suse.com/security/cve/CVE-2021-26708", }, { category: "external", summary: "SUSE Bug 1181806 for CVE-2021-26708", url: "https://bugzilla.suse.com/1181806", }, { category: "external", summary: "SUSE Bug 1183298 for CVE-2021-26708", url: "https://bugzilla.suse.com/1183298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-26708", }, { cve: "CVE-2021-28971", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-28971", }, ], notes: [ { category: "general", text: "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-28971", url: "https://www.suse.com/security/cve/CVE-2021-28971", }, { category: "external", summary: "SUSE Bug 1184196 for CVE-2021-28971", url: "https://bugzilla.suse.com/1184196", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-28971", }, { cve: "CVE-2021-32606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-32606", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-32606", url: "https://www.suse.com/security/cve/CVE-2021-32606", }, { category: "external", summary: "SUSE Bug 1185953 for CVE-2021-32606", url: "https://bugzilla.suse.com/1185953", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-32606", }, { cve: "CVE-2021-33909", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-33909", }, ], notes: [ { category: "general", text: "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-33909", url: "https://www.suse.com/security/cve/CVE-2021-33909", }, { category: "external", summary: "SUSE Bug 1188062 for CVE-2021-33909", url: "https://bugzilla.suse.com/1188062", }, { category: "external", summary: "SUSE Bug 1188063 for CVE-2021-33909", url: "https://bugzilla.suse.com/1188063", }, { category: "external", summary: "SUSE Bug 1188257 for CVE-2021-33909", url: "https://bugzilla.suse.com/1188257", }, { category: "external", summary: "SUSE Bug 1189302 for CVE-2021-33909", url: "https://bugzilla.suse.com/1189302", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2021-33909", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-33909", }, { cve: "CVE-2021-3483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3483", }, ], notes: [ { category: "general", text: "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3483", url: "https://www.suse.com/security/cve/CVE-2021-3483", }, { category: "external", summary: "SUSE Bug 1184393 for CVE-2021-3483", url: "https://bugzilla.suse.com/1184393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3483", }, { cve: "CVE-2021-3489", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3489", }, ], notes: [ { category: "general", text: "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3489", url: "https://www.suse.com/security/cve/CVE-2021-3489", }, { category: "external", summary: "SUSE Bug 1185640 for CVE-2021-3489", url: "https://bugzilla.suse.com/1185640", }, { category: "external", summary: "SUSE Bug 1185856 for CVE-2021-3489", url: "https://bugzilla.suse.com/1185856", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3489", }, { cve: "CVE-2021-3490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3490", }, ], notes: [ { category: "general", text: "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3490", url: "https://www.suse.com/security/cve/CVE-2021-3490", }, { category: "external", summary: "SUSE Bug 1185641 for CVE-2021-3490", url: "https://bugzilla.suse.com/1185641", }, { category: "external", summary: "SUSE Bug 1185796 for CVE-2021-3490", url: "https://bugzilla.suse.com/1185796", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3490", }, { cve: "CVE-2021-3491", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3491", }, ], notes: [ { category: "general", text: "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3491", url: "https://www.suse.com/security/cve/CVE-2021-3491", }, { category: "external", summary: "SUSE Bug 1185642 for CVE-2021-3491", url: "https://bugzilla.suse.com/1185642", }, { category: "external", summary: "SUSE Bug 1187090 for CVE-2021-3491", url: "https://bugzilla.suse.com/1187090", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3491", }, { cve: "CVE-2021-3542", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3542", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3542", url: "https://www.suse.com/security/cve/CVE-2021-3542", }, { category: "external", summary: "SUSE Bug 1184673 for CVE-2021-3542", url: "https://bugzilla.suse.com/1184673", }, { category: "external", summary: "SUSE Bug 1186063 for CVE-2021-3542", url: "https://bugzilla.suse.com/1186063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3542", }, { cve: "CVE-2021-3640", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3640", }, ], notes: [ { category: "general", text: "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3640", url: "https://www.suse.com/security/cve/CVE-2021-3640", }, { category: "external", summary: "SUSE Bug 1188172 for CVE-2021-3640", url: "https://bugzilla.suse.com/1188172", }, { category: "external", summary: "SUSE Bug 1188613 for CVE-2021-3640", url: "https://bugzilla.suse.com/1188613", }, { category: "external", summary: "SUSE Bug 1191530 for CVE-2021-3640", url: "https://bugzilla.suse.com/1191530", }, { category: "external", summary: "SUSE Bug 1196810 for CVE-2021-3640", url: "https://bugzilla.suse.com/1196810", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2021-3640", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3640", }, { cve: "CVE-2021-3653", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3653", }, ], notes: [ { category: "general", text: "A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3653", url: "https://www.suse.com/security/cve/CVE-2021-3653", }, { category: "external", summary: "SUSE Bug 1189399 for CVE-2021-3653", url: "https://bugzilla.suse.com/1189399", }, { category: "external", summary: "SUSE Bug 1189420 for CVE-2021-3653", url: "https://bugzilla.suse.com/1189420", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2021-3653", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3653", }, { cve: "CVE-2021-3656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3656", }, ], notes: [ { category: "general", text: "A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3656", url: "https://www.suse.com/security/cve/CVE-2021-3656", }, { category: "external", summary: "SUSE Bug 1189400 for CVE-2021-3656", url: "https://bugzilla.suse.com/1189400", }, { category: "external", summary: "SUSE Bug 1189418 for CVE-2021-3656", url: "https://bugzilla.suse.com/1189418", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-3656", }, { cve: "CVE-2021-3744", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3744", }, ], notes: [ { category: "general", text: "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3744", url: "https://www.suse.com/security/cve/CVE-2021-3744", }, { category: "external", summary: "SUSE Bug 1189884 for CVE-2021-3744", url: "https://bugzilla.suse.com/1189884", }, { category: "external", summary: "SUSE Bug 1190534 for CVE-2021-3744", url: "https://bugzilla.suse.com/1190534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3744", }, { cve: "CVE-2021-3753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3753", }, ], notes: [ { category: "general", text: "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3753", url: "https://www.suse.com/security/cve/CVE-2021-3753", }, { category: "external", summary: "SUSE Bug 1190025 for CVE-2021-3753", url: "https://bugzilla.suse.com/1190025", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-3753", }, { cve: "CVE-2021-37576", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-37576", }, ], notes: [ { category: "general", text: "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-37576", url: "https://www.suse.com/security/cve/CVE-2021-37576", }, { category: "external", summary: "SUSE Bug 1188838 for CVE-2021-37576", url: "https://bugzilla.suse.com/1188838", }, { category: "external", summary: "SUSE Bug 1188842 for CVE-2021-37576", url: "https://bugzilla.suse.com/1188842", }, { category: "external", summary: "SUSE Bug 1190276 for CVE-2021-37576", url: "https://bugzilla.suse.com/1190276", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-37576", }, { cve: "CVE-2021-3759", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3759", }, ], notes: [ { category: "general", text: "A memory overflow vulnerability was found in the Linux kernel's ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3759", url: "https://www.suse.com/security/cve/CVE-2021-3759", }, { category: "external", summary: "SUSE Bug 1190115 for CVE-2021-3759", url: "https://bugzilla.suse.com/1190115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3759", }, { cve: "CVE-2021-38166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-38166", }, ], notes: [ { category: "general", text: "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-38166", url: "https://www.suse.com/security/cve/CVE-2021-38166", }, { category: "external", summary: "SUSE Bug 1189233 for CVE-2021-38166", url: "https://bugzilla.suse.com/1189233", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-38166", }, { cve: "CVE-2021-43976", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-43976", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-43976", url: "https://www.suse.com/security/cve/CVE-2021-43976", }, { category: "external", summary: "SUSE Bug 1192847 for CVE-2021-43976", url: "https://bugzilla.suse.com/1192847", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-43976", }, { cve: "CVE-2022-0185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0185", }, ], notes: [ { category: "general", text: "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0185", url: "https://www.suse.com/security/cve/CVE-2022-0185", }, { category: "external", summary: "SUSE Bug 1194517 for CVE-2022-0185", url: "https://bugzilla.suse.com/1194517", }, { category: "external", summary: "SUSE Bug 1194737 for CVE-2022-0185", url: "https://bugzilla.suse.com/1194737", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0185", }, { cve: "CVE-2022-0330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0330", }, ], notes: [ { category: "general", text: "A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0330", url: "https://www.suse.com/security/cve/CVE-2022-0330", }, { category: "external", summary: "SUSE Bug 1194880 for CVE-2022-0330", url: "https://bugzilla.suse.com/1194880", }, { category: "external", summary: "SUSE Bug 1195950 for CVE-2022-0330", url: "https://bugzilla.suse.com/1195950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0330", }, { cve: "CVE-2022-0847", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0847", }, ], notes: [ { category: "general", text: "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0847", url: "https://www.suse.com/security/cve/CVE-2022-0847", }, { category: "external", summary: "SUSE Bug 1196584 for CVE-2022-0847", url: "https://bugzilla.suse.com/1196584", }, { category: "external", summary: "SUSE Bug 1196601 for CVE-2022-0847", url: "https://bugzilla.suse.com/1196601", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0847", }, { cve: "CVE-2022-0886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0886", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0886", url: "https://www.suse.com/security/cve/CVE-2022-0886", }, { category: "external", summary: "SUSE Bug 1197131 for CVE-2022-0886", url: "https://bugzilla.suse.com/1197131", }, { category: "external", summary: "SUSE Bug 1197133 for CVE-2022-0886", url: "https://bugzilla.suse.com/1197133", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0886", }, { cve: "CVE-2022-1462", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1462", }, ], notes: [ { category: "general", text: "An out-of-bounds read flaw was found in the Linux kernel's TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1462", url: "https://www.suse.com/security/cve/CVE-2022-1462", }, { category: "external", summary: "SUSE Bug 1198829 for CVE-2022-1462", url: "https://bugzilla.suse.com/1198829", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1462", }, { cve: "CVE-2022-1516", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1516", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1516", url: "https://www.suse.com/security/cve/CVE-2022-1516", }, { category: "external", summary: "SUSE Bug 1199012 for CVE-2022-1516", url: "https://bugzilla.suse.com/1199012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1516", }, { cve: "CVE-2022-1679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1679", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1679", url: "https://www.suse.com/security/cve/CVE-2022-1679", }, { category: "external", summary: "SUSE Bug 1199487 for CVE-2022-1679", url: "https://bugzilla.suse.com/1199487", }, { category: "external", summary: "SUSE Bug 1201080 for CVE-2022-1679", url: "https://bugzilla.suse.com/1201080", }, { category: "external", summary: "SUSE Bug 1201832 for CVE-2022-1679", url: "https://bugzilla.suse.com/1201832", }, { category: "external", summary: "SUSE Bug 1204132 for CVE-2022-1679", url: "https://bugzilla.suse.com/1204132", }, { category: "external", summary: "SUSE Bug 1212316 for CVE-2022-1679", url: "https://bugzilla.suse.com/1212316", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1679", }, { cve: "CVE-2022-1729", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1729", }, ], notes: [ { category: "general", text: "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1729", url: "https://www.suse.com/security/cve/CVE-2022-1729", }, { category: "external", summary: "SUSE Bug 1199507 for CVE-2022-1729", url: "https://bugzilla.suse.com/1199507", }, { category: "external", summary: "SUSE Bug 1199697 for CVE-2022-1729", url: "https://bugzilla.suse.com/1199697", }, { category: "external", summary: "SUSE Bug 1201832 for CVE-2022-1729", url: "https://bugzilla.suse.com/1201832", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-1729", }, { cve: "CVE-2022-1852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1852", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1852", url: "https://www.suse.com/security/cve/CVE-2022-1852", }, { category: "external", summary: "SUSE Bug 1199875 for CVE-2022-1852", url: "https://bugzilla.suse.com/1199875", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1852", }, { cve: "CVE-2022-1966", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1966", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1966", url: "https://www.suse.com/security/cve/CVE-2022-1966", }, { category: "external", summary: "SUSE Bug 1200015 for CVE-2022-1966", url: "https://bugzilla.suse.com/1200015", }, { category: "external", summary: "SUSE Bug 1200268 for CVE-2022-1966", url: "https://bugzilla.suse.com/1200268", }, { category: "external", summary: "SUSE Bug 1200494 for CVE-2022-1966", url: "https://bugzilla.suse.com/1200494", }, { category: "external", summary: "SUSE Bug 1200529 for CVE-2022-1966", url: "https://bugzilla.suse.com/1200529", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-1966", }, { cve: "CVE-2022-1972", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1972", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1972", url: "https://www.suse.com/security/cve/CVE-2022-1972", }, { category: "external", summary: "SUSE Bug 1200019 for CVE-2022-1972", url: "https://bugzilla.suse.com/1200019", }, { category: "external", summary: "SUSE Bug 1200266 for CVE-2022-1972", url: "https://bugzilla.suse.com/1200266", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1972", }, { cve: "CVE-2022-1973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1973", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1973", url: "https://www.suse.com/security/cve/CVE-2022-1973", }, { category: "external", summary: "SUSE Bug 1200023 for CVE-2022-1973", url: "https://bugzilla.suse.com/1200023", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-1973", }, { cve: "CVE-2022-22942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-22942", }, ], notes: [ { category: "general", text: "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-22942", url: "https://www.suse.com/security/cve/CVE-2022-22942", }, { category: "external", summary: "SUSE Bug 1195065 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195065", }, { category: "external", summary: "SUSE Bug 1195951 for CVE-2022-22942", url: "https://bugzilla.suse.com/1195951", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-22942", }, { cve: "CVE-2022-2308", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2308", }, ], notes: [ { category: "general", text: "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2308", url: "https://www.suse.com/security/cve/CVE-2022-2308", }, { category: "external", summary: "SUSE Bug 1202573 for CVE-2022-2308", url: "https://bugzilla.suse.com/1202573", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2308", }, { cve: "CVE-2022-24958", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-24958", }, ], notes: [ { category: "general", text: "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-24958", url: "https://www.suse.com/security/cve/CVE-2022-24958", }, { category: "external", summary: "SUSE Bug 1195905 for CVE-2022-24958", url: "https://bugzilla.suse.com/1195905", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-24958", }, { cve: "CVE-2022-2588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2588", }, ], notes: [ { category: "general", text: "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2588", url: "https://www.suse.com/security/cve/CVE-2022-2588", }, { category: "external", summary: "SUSE Bug 1202096 for CVE-2022-2588", url: "https://bugzilla.suse.com/1202096", }, { category: "external", summary: "SUSE Bug 1203613 for CVE-2022-2588", url: "https://bugzilla.suse.com/1203613", }, { category: "external", summary: "SUSE Bug 1204183 for CVE-2022-2588", url: "https://bugzilla.suse.com/1204183", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-2588", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2588", }, { cve: "CVE-2022-2590", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2590", }, ], notes: [ { category: "general", text: "A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2590", url: "https://www.suse.com/security/cve/CVE-2022-2590", }, { category: "external", summary: "SUSE Bug 1202013 for CVE-2022-2590", url: "https://bugzilla.suse.com/1202013", }, { category: "external", summary: "SUSE Bug 1202089 for CVE-2022-2590", url: "https://bugzilla.suse.com/1202089", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2590", }, { cve: "CVE-2022-26490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-26490", }, ], notes: [ { category: "general", text: "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-26490", url: "https://www.suse.com/security/cve/CVE-2022-26490", }, { category: "external", summary: "SUSE Bug 1196830 for CVE-2022-26490", url: "https://bugzilla.suse.com/1196830", }, { category: "external", summary: "SUSE Bug 1201656 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201656", }, { category: "external", summary: "SUSE Bug 1201969 for CVE-2022-26490", url: "https://bugzilla.suse.com/1201969", }, { category: "external", summary: "SUSE Bug 1211495 for CVE-2022-26490", url: "https://bugzilla.suse.com/1211495", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-26490", }, { cve: "CVE-2022-28388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28388", }, ], notes: [ { category: "general", text: "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28388", url: "https://www.suse.com/security/cve/CVE-2022-28388", }, { category: "external", summary: "SUSE Bug 1198032 for CVE-2022-28388", url: "https://bugzilla.suse.com/1198032", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-28388", }, { cve: "CVE-2022-28389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28389", }, ], notes: [ { category: "general", text: "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28389", url: "https://www.suse.com/security/cve/CVE-2022-28389", }, { category: "external", summary: "SUSE Bug 1198033 for CVE-2022-28389", url: "https://bugzilla.suse.com/1198033", }, { category: "external", summary: "SUSE Bug 1201657 for CVE-2022-28389", url: "https://bugzilla.suse.com/1201657", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-28389", }, { cve: "CVE-2022-28390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28390", }, ], notes: [ { category: "general", text: "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28390", url: "https://www.suse.com/security/cve/CVE-2022-28390", }, { category: "external", summary: "SUSE Bug 1198031 for CVE-2022-28390", url: "https://bugzilla.suse.com/1198031", }, { category: "external", summary: "SUSE Bug 1201517 for CVE-2022-28390", url: "https://bugzilla.suse.com/1201517", }, { category: "external", summary: "SUSE Bug 1207969 for CVE-2022-28390", url: "https://bugzilla.suse.com/1207969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-28390", }, { cve: "CVE-2022-28893", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-28893", }, ], notes: [ { category: "general", text: "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-28893", url: "https://www.suse.com/security/cve/CVE-2022-28893", }, { category: "external", summary: "SUSE Bug 1198330 for CVE-2022-28893", url: "https://bugzilla.suse.com/1198330", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-28893", }, { cve: "CVE-2022-29900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29900", }, ], notes: [ { category: "general", text: "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29900", url: "https://www.suse.com/security/cve/CVE-2022-29900", }, { category: "external", summary: "SUSE Bug 1199657 for CVE-2022-29900", url: "https://bugzilla.suse.com/1199657", }, { category: "external", summary: "SUSE Bug 1201469 for CVE-2022-29900", url: "https://bugzilla.suse.com/1201469", }, { category: "external", summary: "SUSE Bug 1207894 for CVE-2022-29900", url: "https://bugzilla.suse.com/1207894", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29901", }, ], notes: [ { category: "general", text: "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29901", url: "https://www.suse.com/security/cve/CVE-2022-29901", }, { category: "external", summary: "SUSE Bug 1201469 for CVE-2022-29901", url: "https://bugzilla.suse.com/1201469", }, { category: "external", summary: "SUSE Bug 1207894 for CVE-2022-29901", url: "https://bugzilla.suse.com/1207894", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-29901", }, { cve: "CVE-2022-29968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-29968", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-29968", url: "https://www.suse.com/security/cve/CVE-2022-29968", }, { category: "external", summary: "SUSE Bug 1199087 for CVE-2022-29968", url: "https://bugzilla.suse.com/1199087", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-29968", }, { cve: "CVE-2022-3424", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3424", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3424", url: "https://www.suse.com/security/cve/CVE-2022-3424", }, { category: "external", summary: "SUSE Bug 1204166 for CVE-2022-3424", url: "https://bugzilla.suse.com/1204166", }, { category: "external", summary: "SUSE Bug 1204167 for CVE-2022-3424", url: "https://bugzilla.suse.com/1204167", }, { category: "external", summary: "SUSE Bug 1208044 for CVE-2022-3424", url: "https://bugzilla.suse.com/1208044", }, { category: "external", summary: "SUSE Bug 1212309 for CVE-2022-3424", url: "https://bugzilla.suse.com/1212309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-3424", }, { cve: "CVE-2022-34918", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-34918", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-34918", url: "https://www.suse.com/security/cve/CVE-2022-34918", }, { category: "external", summary: "SUSE Bug 1201171 for CVE-2022-34918", url: "https://bugzilla.suse.com/1201171", }, { category: "external", summary: "SUSE Bug 1201177 for CVE-2022-34918", url: "https://bugzilla.suse.com/1201177", }, { category: "external", summary: "SUSE Bug 1201222 for CVE-2022-34918", url: "https://bugzilla.suse.com/1201222", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-34918", }, { cve: "CVE-2022-3628", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3628", }, ], notes: [ { category: "general", text: "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3628", url: "https://www.suse.com/security/cve/CVE-2022-3628", }, { category: "external", summary: "SUSE Bug 1204868 for CVE-2022-3628", url: "https://bugzilla.suse.com/1204868", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-3628", }, { cve: "CVE-2022-3640", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3640", }, ], notes: [ { category: "general", text: "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3640", url: "https://www.suse.com/security/cve/CVE-2022-3640", }, { category: "external", summary: "SUSE Bug 1204619 for CVE-2022-3640", url: "https://bugzilla.suse.com/1204619", }, { category: "external", summary: "SUSE Bug 1204624 for CVE-2022-3640", url: "https://bugzilla.suse.com/1204624", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-3640", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-3640", }, { cve: "CVE-2022-40982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40982", }, ], notes: [ { category: "general", text: "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40982", url: "https://www.suse.com/security/cve/CVE-2022-40982", }, { category: "external", summary: "SUSE Bug 1206418 for CVE-2022-40982", url: "https://bugzilla.suse.com/1206418", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-40982", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-40982", }, { cve: "CVE-2022-41218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41218", }, ], notes: [ { category: "general", text: "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41218", url: "https://www.suse.com/security/cve/CVE-2022-41218", }, { category: "external", summary: "SUSE Bug 1202960 for CVE-2022-41218", url: "https://bugzilla.suse.com/1202960", }, { category: "external", summary: "SUSE Bug 1203606 for CVE-2022-41218", url: "https://bugzilla.suse.com/1203606", }, { category: "external", summary: "SUSE Bug 1205313 for CVE-2022-41218", url: "https://bugzilla.suse.com/1205313", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41218", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-41218", }, { cve: "CVE-2022-41674", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-41674", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-41674", url: "https://www.suse.com/security/cve/CVE-2022-41674", }, { category: "external", summary: "SUSE Bug 1203770 for CVE-2022-41674", url: "https://bugzilla.suse.com/1203770", }, { category: "external", summary: "SUSE Bug 1203994 for CVE-2022-41674", url: "https://bugzilla.suse.com/1203994", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-41674", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-41674", }, { cve: "CVE-2022-42719", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42719", }, ], notes: [ { category: "general", text: "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42719", url: "https://www.suse.com/security/cve/CVE-2022-42719", }, { category: "external", summary: "SUSE Bug 1204051 for CVE-2022-42719", url: "https://bugzilla.suse.com/1204051", }, { category: "external", summary: "SUSE Bug 1204292 for CVE-2022-42719", url: "https://bugzilla.suse.com/1204292", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42719", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-42719", }, { cve: "CVE-2022-42720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42720", }, ], notes: [ { category: "general", text: "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42720", url: "https://www.suse.com/security/cve/CVE-2022-42720", }, { category: "external", summary: "SUSE Bug 1204059 for CVE-2022-42720", url: "https://bugzilla.suse.com/1204059", }, { category: "external", summary: "SUSE Bug 1204291 for CVE-2022-42720", url: "https://bugzilla.suse.com/1204291", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42720", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-42720", }, { cve: "CVE-2022-42721", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42721", }, ], notes: [ { category: "general", text: "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42721", url: "https://www.suse.com/security/cve/CVE-2022-42721", }, { category: "external", summary: "SUSE Bug 1204060 for CVE-2022-42721", url: "https://bugzilla.suse.com/1204060", }, { category: "external", summary: "SUSE Bug 1204290 for CVE-2022-42721", url: "https://bugzilla.suse.com/1204290", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42721", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-42721", }, { cve: "CVE-2022-42722", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-42722", }, ], notes: [ { category: "general", text: "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-42722", url: "https://www.suse.com/security/cve/CVE-2022-42722", }, { category: "external", summary: "SUSE Bug 1204125 for CVE-2022-42722", url: "https://bugzilla.suse.com/1204125", }, { category: "external", summary: "SUSE Bug 1204289 for CVE-2022-42722", url: "https://bugzilla.suse.com/1204289", }, { category: "external", summary: "SUSE Bug 1209225 for CVE-2022-42722", url: "https://bugzilla.suse.com/1209225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-42722", }, { cve: "CVE-2022-4379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-4379", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-4379", url: "https://www.suse.com/security/cve/CVE-2022-4379", }, { category: "external", summary: "SUSE Bug 1206209 for CVE-2022-4379", url: "https://bugzilla.suse.com/1206209", }, { category: "external", summary: "SUSE Bug 1206373 for CVE-2022-4379", url: "https://bugzilla.suse.com/1206373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-4379", }, { cve: "CVE-2022-44032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-44032", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-44032", url: "https://www.suse.com/security/cve/CVE-2022-44032", }, { category: "external", summary: "SUSE Bug 1204894 for CVE-2022-44032", url: "https://bugzilla.suse.com/1204894", }, { category: "external", summary: "SUSE Bug 1212290 for CVE-2022-44032", url: "https://bugzilla.suse.com/1212290", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-44032", }, { cve: "CVE-2022-44033", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-44033", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-44033", url: "https://www.suse.com/security/cve/CVE-2022-44033", }, { category: "external", summary: "SUSE Bug 1204922 for CVE-2022-44033", url: "https://bugzilla.suse.com/1204922", }, { category: "external", summary: "SUSE Bug 1212306 for CVE-2022-44033", url: "https://bugzilla.suse.com/1212306", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-44033", }, { cve: "CVE-2022-44034", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-44034", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-44034", url: "https://www.suse.com/security/cve/CVE-2022-44034", }, { category: "external", summary: "SUSE Bug 1204901 for CVE-2022-44034", url: "https://bugzilla.suse.com/1204901", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-44034", }, { cve: "CVE-2022-45884", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45884", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45884", url: "https://www.suse.com/security/cve/CVE-2022-45884", }, { category: "external", summary: "SUSE Bug 1205756 for CVE-2022-45884", url: "https://bugzilla.suse.com/1205756", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45885", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45885", url: "https://www.suse.com/security/cve/CVE-2022-45885", }, { category: "external", summary: "SUSE Bug 1205758 for CVE-2022-45885", url: "https://bugzilla.suse.com/1205758", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45886", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45886", url: "https://www.suse.com/security/cve/CVE-2022-45886", }, { category: "external", summary: "SUSE Bug 1205760 for CVE-2022-45886", url: "https://bugzilla.suse.com/1205760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45887", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45887", url: "https://www.suse.com/security/cve/CVE-2022-45887", }, { category: "external", summary: "SUSE Bug 1205762 for CVE-2022-45887", url: "https://bugzilla.suse.com/1205762", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2022-45887", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45887", }, { cve: "CVE-2022-45888", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45888", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45888", url: "https://www.suse.com/security/cve/CVE-2022-45888", }, { category: "external", summary: "SUSE Bug 1205764 for CVE-2022-45888", url: "https://bugzilla.suse.com/1205764", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-45888", }, { cve: "CVE-2022-45919", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45919", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45919", url: "https://www.suse.com/security/cve/CVE-2022-45919", }, { category: "external", summary: "SUSE Bug 1205803 for CVE-2022-45919", url: "https://bugzilla.suse.com/1205803", }, { category: "external", summary: "SUSE Bug 1208912 for CVE-2022-45919", url: "https://bugzilla.suse.com/1208912", }, { category: "external", summary: "SUSE Bug 1214128 for CVE-2022-45919", url: "https://bugzilla.suse.com/1214128", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-45919", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-45934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-45934", url: "https://www.suse.com/security/cve/CVE-2022-45934", }, { category: "external", summary: "SUSE Bug 1205796 for CVE-2022-45934", url: "https://bugzilla.suse.com/1205796", }, { category: "external", summary: "SUSE Bug 1212292 for CVE-2022-45934", url: "https://bugzilla.suse.com/1212292", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-45934", }, { cve: "CVE-2023-0045", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0045", }, ], notes: [ { category: "general", text: "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0045", url: "https://www.suse.com/security/cve/CVE-2023-0045", }, { category: "external", summary: "SUSE Bug 1207773 for CVE-2023-0045", url: "https://bugzilla.suse.com/1207773", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-0045", }, { cve: "CVE-2023-1076", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1076", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1076", url: "https://www.suse.com/security/cve/CVE-2023-1076", }, { category: "external", summary: "SUSE Bug 1208599 for CVE-2023-1076", url: "https://bugzilla.suse.com/1208599", }, { category: "external", summary: "SUSE Bug 1214019 for CVE-2023-1076", url: "https://bugzilla.suse.com/1214019", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-1076", }, { cve: "CVE-2023-1078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1078", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1078", url: "https://www.suse.com/security/cve/CVE-2023-1078", }, { category: "external", summary: "SUSE Bug 1208601 for CVE-2023-1078", url: "https://bugzilla.suse.com/1208601", }, { category: "external", summary: "SUSE Bug 1208603 for CVE-2023-1078", url: "https://bugzilla.suse.com/1208603", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2023-1078", }, { cve: "CVE-2023-1192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1192", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1192", url: "https://www.suse.com/security/cve/CVE-2023-1192", }, { category: "external", summary: "SUSE Bug 1208995 for CVE-2023-1192", url: "https://bugzilla.suse.com/1208995", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-1192", }, { cve: "CVE-2023-1380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1380", }, ], notes: [ { category: "general", text: "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1380", url: "https://www.suse.com/security/cve/CVE-2023-1380", }, { category: "external", summary: "SUSE Bug 1209287 for CVE-2023-1380", url: "https://bugzilla.suse.com/1209287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2023-1380", }, { cve: "CVE-2023-20569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20569", }, ], notes: [ { category: "general", text: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20569", url: "https://www.suse.com/security/cve/CVE-2023-20569", }, { category: "external", summary: "SUSE Bug 1213287 for CVE-2023-20569", url: "https://bugzilla.suse.com/1213287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-20569", }, { cve: "CVE-2023-20593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20593", }, ], notes: [ { category: "general", text: "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20593", url: "https://www.suse.com/security/cve/CVE-2023-20593", }, { category: "external", summary: "SUSE Bug 1213286 for CVE-2023-20593", url: "https://bugzilla.suse.com/1213286", }, { category: "external", summary: "SUSE Bug 1213616 for CVE-2023-20593", url: "https://bugzilla.suse.com/1213616", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-20593", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-20593", }, { cve: "CVE-2023-2124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2124", }, ], notes: [ { category: "general", text: "An out-of-bounds memory access flaw was found in the Linux kernel's XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2124", url: "https://www.suse.com/security/cve/CVE-2023-2124", }, { category: "external", summary: "SUSE Bug 1210498 for CVE-2023-2124", url: "https://bugzilla.suse.com/1210498", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-2124", }, { cve: "CVE-2023-31084", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31084", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31084", url: "https://www.suse.com/security/cve/CVE-2023-31084", }, { category: "external", summary: "SUSE Bug 1210783 for CVE-2023-31084", url: "https://bugzilla.suse.com/1210783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-31084", }, { cve: "CVE-2023-3141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3141", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3141", url: "https://www.suse.com/security/cve/CVE-2023-3141", }, { category: "external", summary: "SUSE Bug 1212129 for CVE-2023-3141", url: "https://bugzilla.suse.com/1212129", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3141", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-3141", }, { cve: "CVE-2023-3269", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3269", }, ], notes: [ { category: "general", text: "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3269", url: "https://www.suse.com/security/cve/CVE-2023-3269", }, { category: "external", summary: "SUSE Bug 1212395 for CVE-2023-3269", url: "https://bugzilla.suse.com/1212395", }, { category: "external", summary: "SUSE Bug 1213760 for CVE-2023-3269", url: "https://bugzilla.suse.com/1213760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2023-3269", }, { cve: "CVE-2023-39192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39192", }, ], notes: [ { category: "general", text: "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39192", url: "https://www.suse.com/security/cve/CVE-2023-39192", }, { category: "external", summary: "SUSE Bug 1215858 for CVE-2023-39192", url: "https://bugzilla.suse.com/1215858", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39192", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-39192", }, { cve: "CVE-2023-39193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-39193", }, ], notes: [ { category: "general", text: "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-39193", url: "https://www.suse.com/security/cve/CVE-2023-39193", }, { category: "external", summary: "SUSE Bug 1215860 for CVE-2023-39193", url: "https://bugzilla.suse.com/1215860", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-39193", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-39193", }, { cve: "CVE-2023-4128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4128", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4128", url: "https://www.suse.com/security/cve/CVE-2023-4128", }, { category: "external", summary: "SUSE Bug 1214149 for CVE-2023-4128", url: "https://bugzilla.suse.com/1214149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-4128", }, { cve: "CVE-2023-4134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4134", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4134", url: "https://www.suse.com/security/cve/CVE-2023-4134", }, { category: "external", summary: "SUSE Bug 1213971 for CVE-2023-4134", url: "https://bugzilla.suse.com/1213971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-4134", }, { cve: "CVE-2023-4194", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4194", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode->i_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4194", url: "https://www.suse.com/security/cve/CVE-2023-4194", }, { category: "external", summary: "SUSE Bug 1214019 for CVE-2023-4194", url: "https://bugzilla.suse.com/1214019", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-4194", }, { cve: "CVE-2023-42753", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42753", }, ], notes: [ { category: "general", text: "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42753", url: "https://www.suse.com/security/cve/CVE-2023-42753", }, { category: "external", summary: "SUSE Bug 1215150 for CVE-2023-42753", url: "https://bugzilla.suse.com/1215150", }, { category: "external", summary: "SUSE Bug 1218613 for CVE-2023-42753", url: "https://bugzilla.suse.com/1218613", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-42753", }, { cve: "CVE-2023-42754", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42754", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42754", url: "https://www.suse.com/security/cve/CVE-2023-42754", }, { category: "external", summary: "SUSE Bug 1215467 for CVE-2023-42754", url: "https://bugzilla.suse.com/1215467", }, { category: "external", summary: "SUSE Bug 1222212 for CVE-2023-42754", url: "https://bugzilla.suse.com/1222212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-42754", }, { cve: "CVE-2023-42756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-42756", }, ], notes: [ { category: "general", text: "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-42756", url: "https://www.suse.com/security/cve/CVE-2023-42756", }, { category: "external", summary: "SUSE Bug 1215767 for CVE-2023-42756", url: "https://bugzilla.suse.com/1215767", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-42756", }, { cve: "CVE-2023-4623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4623", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4623", url: "https://www.suse.com/security/cve/CVE-2023-4623", }, { category: "external", summary: "SUSE Bug 1215115 for CVE-2023-4623", url: "https://bugzilla.suse.com/1215115", }, { category: "external", summary: "SUSE Bug 1215440 for CVE-2023-4623", url: "https://bugzilla.suse.com/1215440", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-4623", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-4623", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1219698 for CVE-2023-4623", url: "https://bugzilla.suse.com/1219698", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-4623", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-4623", url: "https://bugzilla.suse.com/1221598", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2023-4623", }, { cve: "CVE-2023-46813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-46813", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-46813", url: "https://www.suse.com/security/cve/CVE-2023-46813", }, { category: "external", summary: "SUSE Bug 1212649 for CVE-2023-46813", url: "https://bugzilla.suse.com/1212649", }, { category: "external", summary: "SUSE Bug 1216896 for CVE-2023-46813", url: "https://bugzilla.suse.com/1216896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-46813", }, { cve: "CVE-2023-4881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4881", }, ], notes: [ { category: "general", text: "** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4881", url: "https://www.suse.com/security/cve/CVE-2023-4881", }, { category: "external", summary: "SUSE Bug 1215221 for CVE-2023-4881", url: "https://bugzilla.suse.com/1215221", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-4881", }, { cve: "CVE-2023-5345", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5345", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5345", url: "https://www.suse.com/security/cve/CVE-2023-5345", }, { category: "external", summary: "SUSE Bug 1215899 for CVE-2023-5345", url: "https://bugzilla.suse.com/1215899", }, { category: "external", summary: "SUSE Bug 1215971 for CVE-2023-5345", url: "https://bugzilla.suse.com/1215971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-5345", }, { cve: "CVE-2023-6606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6606", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6606", url: "https://www.suse.com/security/cve/CVE-2023-6606", }, { category: "external", summary: "SUSE Bug 1217947 for CVE-2023-6606", url: "https://bugzilla.suse.com/1217947", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-6606", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-6606", }, { cve: "CVE-2023-6610", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-6610", }, ], notes: [ { category: "general", text: "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-6610", url: "https://www.suse.com/security/cve/CVE-2023-6610", }, { category: "external", summary: "SUSE Bug 1217946 for CVE-2023-6610", url: "https://bugzilla.suse.com/1217946", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-6610", }, ], }
opensuse-su-2024:12697-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-6.1.12-1.1 on GA media
Notes
Title of the patch
kernel-devel-6.1.12-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-6.1.12-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12697
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "kernel-devel-6.1.12-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the kernel-devel-6.1.12-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12697", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12697-1.json", }, { category: "self", summary: "SUSE CVE CVE-2016-3695 page", url: "https://www.suse.com/security/cve/CVE-2016-3695/", }, { category: "self", summary: "SUSE CVE CVE-2023-0045 page", url: "https://www.suse.com/security/cve/CVE-2023-0045/", }, ], title: "kernel-devel-6.1.12-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12697-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-6.1.12-1.1.aarch64", product: { name: "kernel-devel-6.1.12-1.1.aarch64", product_id: "kernel-devel-6.1.12-1.1.aarch64", }, }, { category: "product_version", name: "kernel-macros-6.1.12-1.1.aarch64", product: { name: "kernel-macros-6.1.12-1.1.aarch64", product_id: "kernel-macros-6.1.12-1.1.aarch64", }, }, { category: "product_version", name: "kernel-source-6.1.12-1.1.aarch64", product: { name: "kernel-source-6.1.12-1.1.aarch64", product_id: "kernel-source-6.1.12-1.1.aarch64", }, }, { category: "product_version", name: "kernel-source-vanilla-6.1.12-1.1.aarch64", product: { name: "kernel-source-vanilla-6.1.12-1.1.aarch64", product_id: "kernel-source-vanilla-6.1.12-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-6.1.12-1.1.ppc64le", product: { name: "kernel-devel-6.1.12-1.1.ppc64le", product_id: "kernel-devel-6.1.12-1.1.ppc64le", }, }, { category: "product_version", name: "kernel-macros-6.1.12-1.1.ppc64le", product: { name: "kernel-macros-6.1.12-1.1.ppc64le", product_id: "kernel-macros-6.1.12-1.1.ppc64le", }, }, { category: "product_version", name: "kernel-source-6.1.12-1.1.ppc64le", product: { name: "kernel-source-6.1.12-1.1.ppc64le", product_id: "kernel-source-6.1.12-1.1.ppc64le", }, }, { category: "product_version", name: "kernel-source-vanilla-6.1.12-1.1.ppc64le", product: { name: "kernel-source-vanilla-6.1.12-1.1.ppc64le", product_id: "kernel-source-vanilla-6.1.12-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-devel-6.1.12-1.1.s390x", product: { name: "kernel-devel-6.1.12-1.1.s390x", product_id: "kernel-devel-6.1.12-1.1.s390x", }, }, { category: "product_version", name: "kernel-macros-6.1.12-1.1.s390x", product: { name: "kernel-macros-6.1.12-1.1.s390x", product_id: "kernel-macros-6.1.12-1.1.s390x", }, }, { category: "product_version", name: "kernel-source-6.1.12-1.1.s390x", product: { name: "kernel-source-6.1.12-1.1.s390x", product_id: "kernel-source-6.1.12-1.1.s390x", }, }, { category: "product_version", name: "kernel-source-vanilla-6.1.12-1.1.s390x", product: { name: "kernel-source-vanilla-6.1.12-1.1.s390x", product_id: "kernel-source-vanilla-6.1.12-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-devel-6.1.12-1.1.x86_64", product: { name: "kernel-devel-6.1.12-1.1.x86_64", product_id: "kernel-devel-6.1.12-1.1.x86_64", }, }, { category: "product_version", name: "kernel-macros-6.1.12-1.1.x86_64", product: { name: "kernel-macros-6.1.12-1.1.x86_64", product_id: "kernel-macros-6.1.12-1.1.x86_64", }, }, { category: "product_version", name: "kernel-source-6.1.12-1.1.x86_64", product: { name: "kernel-source-6.1.12-1.1.x86_64", product_id: "kernel-source-6.1.12-1.1.x86_64", }, }, { category: "product_version", name: "kernel-source-vanilla-6.1.12-1.1.x86_64", product: { name: "kernel-source-vanilla-6.1.12-1.1.x86_64", product_id: "kernel-source-vanilla-6.1.12-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-devel-6.1.12-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.aarch64", }, product_reference: "kernel-devel-6.1.12-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-6.1.12-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.ppc64le", }, product_reference: "kernel-devel-6.1.12-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-6.1.12-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.s390x", }, product_reference: "kernel-devel-6.1.12-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-6.1.12-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.x86_64", }, product_reference: "kernel-devel-6.1.12-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-6.1.12-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.aarch64", }, product_reference: "kernel-macros-6.1.12-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-6.1.12-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.ppc64le", }, product_reference: "kernel-macros-6.1.12-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-6.1.12-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.s390x", }, product_reference: "kernel-macros-6.1.12-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-6.1.12-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.x86_64", }, product_reference: "kernel-macros-6.1.12-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-6.1.12-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.aarch64", }, product_reference: "kernel-source-6.1.12-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-6.1.12-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.ppc64le", }, product_reference: "kernel-source-6.1.12-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-6.1.12-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.s390x", }, product_reference: "kernel-source-6.1.12-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-6.1.12-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.x86_64", }, product_reference: "kernel-source-6.1.12-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-6.1.12-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.aarch64", }, product_reference: "kernel-source-vanilla-6.1.12-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-6.1.12-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.ppc64le", }, product_reference: "kernel-source-vanilla-6.1.12-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-6.1.12-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.s390x", }, product_reference: "kernel-source-vanilla-6.1.12-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-6.1.12-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.x86_64", }, product_reference: "kernel-source-vanilla-6.1.12-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3695", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3695", }, ], notes: [ { category: "general", text: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3695", url: "https://www.suse.com/security/cve/CVE-2016-3695", }, { category: "external", summary: "SUSE Bug 1023051 for CVE-2016-3695", url: "https://bugzilla.suse.com/1023051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-3695", }, { cve: "CVE-2023-0045", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0045", }, ], notes: [ { category: "general", text: "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0045", url: "https://www.suse.com/security/cve/CVE-2023-0045", }, { category: "external", summary: "SUSE Bug 1207773 for CVE-2023-0045", url: "https://bugzilla.suse.com/1207773", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-6.1.12-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-6.1.12-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2023-0045", }, ], }
ghsa-3c7w-rm52-555g
Vulnerability from github
Published
2022-05-14 03:51
Modified
2022-05-14 03:51
Severity ?
Details
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
{ affected: [], aliases: [ "CVE-2016-3695", ], database_specific: { cwe_ids: [ "CWE-74", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2017-12-29T15:29:00Z", severity: "MODERATE", }, details: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", id: "GHSA-3c7w-rm52-555g", modified: "2022-05-14T03:51:11Z", published: "2022-05-14T03:51:11Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-3695", }, { type: "WEB", url: "https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1322755", }, { type: "WEB", url: "http://www.securityfocus.com/bid/102327", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2016-3695
Vulnerability from fkie_nvd
Published
2017-12-29 15:29
Modified
2025-04-20 01:37
Severity ?
Summary
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/102327 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1322755 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102327 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1322755 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | - | |
redhat | enterprise_linux | 7.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", }, { lang: "es", value: "La función einj_error_inject en drivers/acpi/apei/einj.c en el kernel de Linux permite que usuarios locales simulen errores de hardware y, consecuentemente, provoquen una denegación de servicio (DoS) aprovechando el error a la hora de deshabilitar la inyección de errores APEI mediante EINJ cuando está establecido securelevel.", }, ], id: "CVE-2016-3695", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-12-29T15:29:00.580", references: [ { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/102327", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1322755", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/102327", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1322755", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-74", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.