Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-5.14.6-1.4 on GA media

Notes

Title of the patch
kernel-devel-5.14.6-1.4 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "kernel-devel-5.14.6-1.4 on GA media",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "openSUSE-Tumbleweed-2024-10728",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-1000251 page",
            url: "https://www.suse.com/security/cve/CVE-2017-1000251/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-12153 page",
            url: "https://www.suse.com/security/cve/CVE-2017-12153/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-13080 page",
            url: "https://www.suse.com/security/cve/CVE-2017-13080/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-14051 page",
            url: "https://www.suse.com/security/cve/CVE-2017-14051/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-15129 page",
            url: "https://www.suse.com/security/cve/CVE-2017-15129/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-15265 page",
            url: "https://www.suse.com/security/cve/CVE-2017-15265/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-16536 page",
            url: "https://www.suse.com/security/cve/CVE-2017-16536/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-16537 page",
            url: "https://www.suse.com/security/cve/CVE-2017-16537/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-16645 page",
            url: "https://www.suse.com/security/cve/CVE-2017-16645/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-16646 page",
            url: "https://www.suse.com/security/cve/CVE-2017-16646/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-16647 page",
            url: "https://www.suse.com/security/cve/CVE-2017-16647/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-16648 page",
            url: "https://www.suse.com/security/cve/CVE-2017-16648/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-16995 page",
            url: "https://www.suse.com/security/cve/CVE-2017-16995/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-16996 page",
            url: "https://www.suse.com/security/cve/CVE-2017-16996/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17448 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17448/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17449 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17449/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17450 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17450/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17852 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17852/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17853 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17853/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17854 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17854/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17855 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17855/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17856 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17856/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17857 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17857/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-17862 page",
            url: "https://www.suse.com/security/cve/CVE-2017-17862/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-5123 page",
            url: "https://www.suse.com/security/cve/CVE-2017-5123/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-5715 page",
            url: "https://www.suse.com/security/cve/CVE-2017-5715/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-5753 page",
            url: "https://www.suse.com/security/cve/CVE-2017-5753/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-5754 page",
            url: "https://www.suse.com/security/cve/CVE-2017-5754/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-7541 page",
            url: "https://www.suse.com/security/cve/CVE-2017-7541/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-7542 page",
            url: "https://www.suse.com/security/cve/CVE-2017-7542/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-8824 page",
            url: "https://www.suse.com/security/cve/CVE-2017-8824/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2017-8831 page",
            url: "https://www.suse.com/security/cve/CVE-2017-8831/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-1000004 page",
            url: "https://www.suse.com/security/cve/CVE-2018-1000004/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-10322 page",
            url: "https://www.suse.com/security/cve/CVE-2018-10322/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-10323 page",
            url: "https://www.suse.com/security/cve/CVE-2018-10323/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-1068 page",
            url: "https://www.suse.com/security/cve/CVE-2018-1068/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-1118 page",
            url: "https://www.suse.com/security/cve/CVE-2018-1118/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-12232 page",
            url: "https://www.suse.com/security/cve/CVE-2018-12232/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-12714 page",
            url: "https://www.suse.com/security/cve/CVE-2018-12714/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-13053 page",
            url: "https://www.suse.com/security/cve/CVE-2018-13053/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-18710 page",
            url: "https://www.suse.com/security/cve/CVE-2018-18710/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-19824 page",
            url: "https://www.suse.com/security/cve/CVE-2018-19824/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-5332 page",
            url: "https://www.suse.com/security/cve/CVE-2018-5332/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-5333 page",
            url: "https://www.suse.com/security/cve/CVE-2018-5333/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-8043 page",
            url: "https://www.suse.com/security/cve/CVE-2018-8043/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-8087 page",
            url: "https://www.suse.com/security/cve/CVE-2018-8087/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-8822 page",
            url: "https://www.suse.com/security/cve/CVE-2018-8822/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-10207 page",
            url: "https://www.suse.com/security/cve/CVE-2019-10207/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-11477 page",
            url: "https://www.suse.com/security/cve/CVE-2019-11477/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-11478 page",
            url: "https://www.suse.com/security/cve/CVE-2019-11478/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-11479 page",
            url: "https://www.suse.com/security/cve/CVE-2019-11479/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-14615 page",
            url: "https://www.suse.com/security/cve/CVE-2019-14615/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-14814 page",
            url: "https://www.suse.com/security/cve/CVE-2019-14814/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-14896 page",
            url: "https://www.suse.com/security/cve/CVE-2019-14896/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-15030 page",
            url: "https://www.suse.com/security/cve/CVE-2019-15030/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-15031 page",
            url: "https://www.suse.com/security/cve/CVE-2019-15031/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-15098 page",
            url: "https://www.suse.com/security/cve/CVE-2019-15098/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-15099 page",
            url: "https://www.suse.com/security/cve/CVE-2019-15099/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-15290 page",
            url: "https://www.suse.com/security/cve/CVE-2019-15290/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-15504 page",
            url: "https://www.suse.com/security/cve/CVE-2019-15504/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-15902 page",
            url: "https://www.suse.com/security/cve/CVE-2019-15902/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-16231 page",
            url: "https://www.suse.com/security/cve/CVE-2019-16231/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-16232 page",
            url: "https://www.suse.com/security/cve/CVE-2019-16232/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-16234 page",
            url: "https://www.suse.com/security/cve/CVE-2019-16234/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-17133 page",
            url: "https://www.suse.com/security/cve/CVE-2019-17133/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-17666 page",
            url: "https://www.suse.com/security/cve/CVE-2019-17666/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-18808 page",
            url: "https://www.suse.com/security/cve/CVE-2019-18808/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-18812 page",
            url: "https://www.suse.com/security/cve/CVE-2019-18812/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-18813 page",
            url: "https://www.suse.com/security/cve/CVE-2019-18813/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-19252 page",
            url: "https://www.suse.com/security/cve/CVE-2019-19252/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-19332 page",
            url: "https://www.suse.com/security/cve/CVE-2019-19332/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-19338 page",
            url: "https://www.suse.com/security/cve/CVE-2019-19338/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-3016 page",
            url: "https://www.suse.com/security/cve/CVE-2019-3016/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-3846 page",
            url: "https://www.suse.com/security/cve/CVE-2019-3846/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-3882 page",
            url: "https://www.suse.com/security/cve/CVE-2019-3882/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-3887 page",
            url: "https://www.suse.com/security/cve/CVE-2019-3887/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-6974 page",
            url: "https://www.suse.com/security/cve/CVE-2019-6974/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-7221 page",
            url: "https://www.suse.com/security/cve/CVE-2019-7221/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-7222 page",
            url: "https://www.suse.com/security/cve/CVE-2019-7222/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-8564 page",
            url: "https://www.suse.com/security/cve/CVE-2019-8564/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-8912 page",
            url: "https://www.suse.com/security/cve/CVE-2019-8912/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-9500 page",
            url: "https://www.suse.com/security/cve/CVE-2019-9500/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-10135 page",
            url: "https://www.suse.com/security/cve/CVE-2020-10135/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-10766 page",
            url: "https://www.suse.com/security/cve/CVE-2020-10766/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-10767 page",
            url: "https://www.suse.com/security/cve/CVE-2020-10767/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-10768 page",
            url: "https://www.suse.com/security/cve/CVE-2020-10768/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-12351 page",
            url: "https://www.suse.com/security/cve/CVE-2020-12351/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-12352 page",
            url: "https://www.suse.com/security/cve/CVE-2020-12352/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-14331 page",
            url: "https://www.suse.com/security/cve/CVE-2020-14331/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-14386 page",
            url: "https://www.suse.com/security/cve/CVE-2020-14386/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-24586 page",
            url: "https://www.suse.com/security/cve/CVE-2020-24586/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-24587 page",
            url: "https://www.suse.com/security/cve/CVE-2020-24587/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-24588 page",
            url: "https://www.suse.com/security/cve/CVE-2020-24588/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-25639 page",
            url: "https://www.suse.com/security/cve/CVE-2020-25639/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-25656 page",
            url: "https://www.suse.com/security/cve/CVE-2020-25656/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-25668 page",
            url: "https://www.suse.com/security/cve/CVE-2020-25668/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-26141 page",
            url: "https://www.suse.com/security/cve/CVE-2020-26141/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-2732 page",
            url: "https://www.suse.com/security/cve/CVE-2020-2732/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-29660 page",
            url: "https://www.suse.com/security/cve/CVE-2020-29660/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-29661 page",
            url: "https://www.suse.com/security/cve/CVE-2020-29661/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-8648 page",
            url: "https://www.suse.com/security/cve/CVE-2020-8648/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-8694 page",
            url: "https://www.suse.com/security/cve/CVE-2020-8694/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-23133 page",
            url: "https://www.suse.com/security/cve/CVE-2021-23133/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-26708 page",
            url: "https://www.suse.com/security/cve/CVE-2021-26708/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-28971 page",
            url: "https://www.suse.com/security/cve/CVE-2021-28971/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-32606 page",
            url: "https://www.suse.com/security/cve/CVE-2021-32606/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-33909 page",
            url: "https://www.suse.com/security/cve/CVE-2021-33909/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3483 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3483/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3489 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3489/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3490 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3490/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3491 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3491/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3640 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3640/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3653 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3653/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3656 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3656/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3744 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3744/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3753 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3753/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-37576 page",
            url: "https://www.suse.com/security/cve/CVE-2021-37576/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3759 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3759/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-38166 page",
            url: "https://www.suse.com/security/cve/CVE-2021-38166/",
         },
      ],
      title: "kernel-devel-5.14.6-1.4 on GA media",
      tracking: {
         current_release_date: "2024-06-15T00:00:00Z",
         generator: {
            date: "2024-06-15T00:00:00Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "openSUSE-SU-2024:10728-1",
         initial_release_date: "2024-06-15T00:00:00Z",
         revision_history: [
            {
               date: "2024-06-15T00:00:00Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "kernel-devel-5.14.6-1.4.aarch64",
                        product: {
                           name: "kernel-devel-5.14.6-1.4.aarch64",
                           product_id: "kernel-devel-5.14.6-1.4.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-macros-5.14.6-1.4.aarch64",
                        product: {
                           name: "kernel-macros-5.14.6-1.4.aarch64",
                           product_id: "kernel-macros-5.14.6-1.4.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-5.14.6-1.4.aarch64",
                        product: {
                           name: "kernel-source-5.14.6-1.4.aarch64",
                           product_id: "kernel-source-5.14.6-1.4.aarch64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-vanilla-5.14.6-1.4.aarch64",
                        product: {
                           name: "kernel-source-vanilla-5.14.6-1.4.aarch64",
                           product_id: "kernel-source-vanilla-5.14.6-1.4.aarch64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "kernel-devel-5.14.6-1.4.ppc64le",
                        product: {
                           name: "kernel-devel-5.14.6-1.4.ppc64le",
                           product_id: "kernel-devel-5.14.6-1.4.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-macros-5.14.6-1.4.ppc64le",
                        product: {
                           name: "kernel-macros-5.14.6-1.4.ppc64le",
                           product_id: "kernel-macros-5.14.6-1.4.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-5.14.6-1.4.ppc64le",
                        product: {
                           name: "kernel-source-5.14.6-1.4.ppc64le",
                           product_id: "kernel-source-5.14.6-1.4.ppc64le",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-vanilla-5.14.6-1.4.ppc64le",
                        product: {
                           name: "kernel-source-vanilla-5.14.6-1.4.ppc64le",
                           product_id: "kernel-source-vanilla-5.14.6-1.4.ppc64le",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64le",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "kernel-devel-5.14.6-1.4.s390x",
                        product: {
                           name: "kernel-devel-5.14.6-1.4.s390x",
                           product_id: "kernel-devel-5.14.6-1.4.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-macros-5.14.6-1.4.s390x",
                        product: {
                           name: "kernel-macros-5.14.6-1.4.s390x",
                           product_id: "kernel-macros-5.14.6-1.4.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-5.14.6-1.4.s390x",
                        product: {
                           name: "kernel-source-5.14.6-1.4.s390x",
                           product_id: "kernel-source-5.14.6-1.4.s390x",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-vanilla-5.14.6-1.4.s390x",
                        product: {
                           name: "kernel-source-vanilla-5.14.6-1.4.s390x",
                           product_id: "kernel-source-vanilla-5.14.6-1.4.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "kernel-devel-5.14.6-1.4.x86_64",
                        product: {
                           name: "kernel-devel-5.14.6-1.4.x86_64",
                           product_id: "kernel-devel-5.14.6-1.4.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-macros-5.14.6-1.4.x86_64",
                        product: {
                           name: "kernel-macros-5.14.6-1.4.x86_64",
                           product_id: "kernel-macros-5.14.6-1.4.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-5.14.6-1.4.x86_64",
                        product: {
                           name: "kernel-source-5.14.6-1.4.x86_64",
                           product_id: "kernel-source-5.14.6-1.4.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-vanilla-5.14.6-1.4.x86_64",
                        product: {
                           name: "kernel-source-vanilla-5.14.6-1.4.x86_64",
                           product_id: "kernel-source-vanilla-5.14.6-1.4.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "openSUSE Tumbleweed",
                        product: {
                           name: "openSUSE Tumbleweed",
                           product_id: "openSUSE Tumbleweed",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:tumbleweed",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            },
            product_reference: "kernel-devel-5.14.6-1.4.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            },
            product_reference: "kernel-devel-5.14.6-1.4.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            },
            product_reference: "kernel-devel-5.14.6-1.4.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            },
            product_reference: "kernel-devel-5.14.6-1.4.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            },
            product_reference: "kernel-macros-5.14.6-1.4.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            },
            product_reference: "kernel-macros-5.14.6-1.4.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            },
            product_reference: "kernel-macros-5.14.6-1.4.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            },
            product_reference: "kernel-macros-5.14.6-1.4.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            },
            product_reference: "kernel-source-5.14.6-1.4.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            },
            product_reference: "kernel-source-5.14.6-1.4.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            },
            product_reference: "kernel-source-5.14.6-1.4.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            },
            product_reference: "kernel-source-5.14.6-1.4.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            },
            product_reference: "kernel-source-vanilla-5.14.6-1.4.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            },
            product_reference: "kernel-source-vanilla-5.14.6-1.4.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            },
            product_reference: "kernel-source-vanilla-5.14.6-1.4.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            },
            product_reference: "kernel-source-vanilla-5.14.6-1.4.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2017-1000251",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-1000251",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-1000251",
               url: "https://www.suse.com/security/cve/CVE-2017-1000251",
            },
            {
               category: "external",
               summary: "SUSE Bug 1057389 for CVE-2017-1000251",
               url: "https://bugzilla.suse.com/1057389",
            },
            {
               category: "external",
               summary: "SUSE Bug 1057950 for CVE-2017-1000251",
               url: "https://bugzilla.suse.com/1057950",
            },
            {
               category: "external",
               summary: "SUSE Bug 1070535 for CVE-2017-1000251",
               url: "https://bugzilla.suse.com/1070535",
            },
            {
               category: "external",
               summary: "SUSE Bug 1072117 for CVE-2017-1000251",
               url: "https://bugzilla.suse.com/1072117",
            },
            {
               category: "external",
               summary: "SUSE Bug 1072162 for CVE-2017-1000251",
               url: "https://bugzilla.suse.com/1072162",
            },
            {
               category: "external",
               summary: "SUSE Bug 1120758 for CVE-2017-1000251",
               url: "https://bugzilla.suse.com/1120758",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-1000251",
      },
      {
         cve: "CVE-2017-12153",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-12153",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-12153",
               url: "https://www.suse.com/security/cve/CVE-2017-12153",
            },
            {
               category: "external",
               summary: "SUSE Bug 1058410 for CVE-2017-12153",
               url: "https://bugzilla.suse.com/1058410",
            },
            {
               category: "external",
               summary: "SUSE Bug 1058624 for CVE-2017-12153",
               url: "https://bugzilla.suse.com/1058624",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-12153",
      },
      {
         cve: "CVE-2017-13080",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-13080",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-13080",
               url: "https://www.suse.com/security/cve/CVE-2017-13080",
            },
            {
               category: "external",
               summary: "SUSE Bug 1056061 for CVE-2017-13080",
               url: "https://bugzilla.suse.com/1056061",
            },
            {
               category: "external",
               summary: "SUSE Bug 1063479 for CVE-2017-13080",
               url: "https://bugzilla.suse.com/1063479",
            },
            {
               category: "external",
               summary: "SUSE Bug 1063667 for CVE-2017-13080",
               url: "https://bugzilla.suse.com/1063667",
            },
            {
               category: "external",
               summary: "SUSE Bug 1063671 for CVE-2017-13080",
               url: "https://bugzilla.suse.com/1063671",
            },
            {
               category: "external",
               summary: "SUSE Bug 1066295 for CVE-2017-13080",
               url: "https://bugzilla.suse.com/1066295",
            },
            {
               category: "external",
               summary: "SUSE Bug 1105108 for CVE-2017-13080",
               url: "https://bugzilla.suse.com/1105108",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178872 for CVE-2017-13080",
               url: "https://bugzilla.suse.com/1178872",
            },
            {
               category: "external",
               summary: "SUSE Bug 1179588 for CVE-2017-13080",
               url: "https://bugzilla.suse.com/1179588",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-13080",
      },
      {
         cve: "CVE-2017-14051",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-14051",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-14051",
               url: "https://www.suse.com/security/cve/CVE-2017-14051",
            },
            {
               category: "external",
               summary: "SUSE Bug 1056588 for CVE-2017-14051",
               url: "https://bugzilla.suse.com/1056588",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-14051",
      },
      {
         cve: "CVE-2017-15129",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-15129",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-15129",
               url: "https://www.suse.com/security/cve/CVE-2017-15129",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074839 for CVE-2017-15129",
               url: "https://bugzilla.suse.com/1074839",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-15129",
      },
      {
         cve: "CVE-2017-15265",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-15265",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-15265",
               url: "https://www.suse.com/security/cve/CVE-2017-15265",
            },
            {
               category: "external",
               summary: "SUSE Bug 1062520 for CVE-2017-15265",
               url: "https://bugzilla.suse.com/1062520",
            },
            {
               category: "external",
               summary: "SUSE Bug 1115893 for CVE-2017-15265",
               url: "https://bugzilla.suse.com/1115893",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-15265",
      },
      {
         cve: "CVE-2017-16536",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-16536",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-16536",
               url: "https://www.suse.com/security/cve/CVE-2017-16536",
            },
            {
               category: "external",
               summary: "SUSE Bug 1066606 for CVE-2017-16536",
               url: "https://bugzilla.suse.com/1066606",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2017-16536",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146519 for CVE-2017-16536",
               url: "https://bugzilla.suse.com/1146519",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-16536",
      },
      {
         cve: "CVE-2017-16537",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-16537",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-16537",
               url: "https://www.suse.com/security/cve/CVE-2017-16537",
            },
            {
               category: "external",
               summary: "SUSE Bug 1066573 for CVE-2017-16537",
               url: "https://bugzilla.suse.com/1066573",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2017-16537",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146519 for CVE-2017-16537",
               url: "https://bugzilla.suse.com/1146519",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-16537",
      },
      {
         cve: "CVE-2017-16645",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-16645",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-16645",
               url: "https://www.suse.com/security/cve/CVE-2017-16645",
            },
            {
               category: "external",
               summary: "SUSE Bug 1067132 for CVE-2017-16645",
               url: "https://bugzilla.suse.com/1067132",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2017-16645",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146519 for CVE-2017-16645",
               url: "https://bugzilla.suse.com/1146519",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-16645",
      },
      {
         cve: "CVE-2017-16646",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-16646",
            },
         ],
         notes: [
            {
               category: "general",
               text: "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-16646",
               url: "https://www.suse.com/security/cve/CVE-2017-16646",
            },
            {
               category: "external",
               summary: "SUSE Bug 1067105 for CVE-2017-16646",
               url: "https://bugzilla.suse.com/1067105",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146519 for CVE-2017-16646",
               url: "https://bugzilla.suse.com/1146519",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-16646",
      },
      {
         cve: "CVE-2017-16647",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-16647",
            },
         ],
         notes: [
            {
               category: "general",
               text: "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-16647",
               url: "https://www.suse.com/security/cve/CVE-2017-16647",
            },
            {
               category: "external",
               summary: "SUSE Bug 1067102 for CVE-2017-16647",
               url: "https://bugzilla.suse.com/1067102",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146519 for CVE-2017-16647",
               url: "https://bugzilla.suse.com/1146519",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-16647",
      },
      {
         cve: "CVE-2017-16648",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-16648",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-16648",
               url: "https://www.suse.com/security/cve/CVE-2017-16648",
            },
            {
               category: "external",
               summary: "SUSE Bug 1067087 for CVE-2017-16648",
               url: "https://bugzilla.suse.com/1067087",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2017-16648",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146519 for CVE-2017-16648",
               url: "https://bugzilla.suse.com/1146519",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-16648",
      },
      {
         cve: "CVE-2017-16995",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-16995",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-16995",
               url: "https://www.suse.com/security/cve/CVE-2017-16995",
            },
            {
               category: "external",
               summary: "SUSE Bug 1073928 for CVE-2017-16995",
               url: "https://bugzilla.suse.com/1073928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-16995",
      },
      {
         cve: "CVE-2017-16996",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-16996",
            },
         ],
         notes: [
            {
               category: "general",
               text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-16996",
               url: "https://www.suse.com/security/cve/CVE-2017-16996",
            },
            {
               category: "external",
               summary: "SUSE Bug 1073928 for CVE-2017-16996",
               url: "https://bugzilla.suse.com/1073928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-16996",
      },
      {
         cve: "CVE-2017-17448",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17448",
            },
         ],
         notes: [
            {
               category: "general",
               text: "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17448",
               url: "https://www.suse.com/security/cve/CVE-2017-17448",
            },
            {
               category: "external",
               summary: "SUSE Bug 1071693 for CVE-2017-17448",
               url: "https://bugzilla.suse.com/1071693",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17448",
      },
      {
         cve: "CVE-2017-17449",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17449",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17449",
               url: "https://www.suse.com/security/cve/CVE-2017-17449",
            },
            {
               category: "external",
               summary: "SUSE Bug 1071694 for CVE-2017-17449",
               url: "https://bugzilla.suse.com/1071694",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17449",
      },
      {
         cve: "CVE-2017-17450",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17450",
            },
         ],
         notes: [
            {
               category: "general",
               text: "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17450",
               url: "https://www.suse.com/security/cve/CVE-2017-17450",
            },
            {
               category: "external",
               summary: "SUSE Bug 1071695 for CVE-2017-17450",
               url: "https://bugzilla.suse.com/1071695",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074033 for CVE-2017-17450",
               url: "https://bugzilla.suse.com/1074033",
            },
            {
               category: "external",
               summary: "SUSE Bug 1115893 for CVE-2017-17450",
               url: "https://bugzilla.suse.com/1115893",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17450",
      },
      {
         cve: "CVE-2017-17852",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17852",
            },
         ],
         notes: [
            {
               category: "general",
               text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17852",
               url: "https://www.suse.com/security/cve/CVE-2017-17852",
            },
            {
               category: "external",
               summary: "SUSE Bug 1073928 for CVE-2017-17852",
               url: "https://bugzilla.suse.com/1073928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17852",
      },
      {
         cve: "CVE-2017-17853",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17853",
            },
         ],
         notes: [
            {
               category: "general",
               text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17853",
               url: "https://www.suse.com/security/cve/CVE-2017-17853",
            },
            {
               category: "external",
               summary: "SUSE Bug 1073928 for CVE-2017-17853",
               url: "https://bugzilla.suse.com/1073928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17853",
      },
      {
         cve: "CVE-2017-17854",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17854",
            },
         ],
         notes: [
            {
               category: "general",
               text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17854",
               url: "https://www.suse.com/security/cve/CVE-2017-17854",
            },
            {
               category: "external",
               summary: "SUSE Bug 1073928 for CVE-2017-17854",
               url: "https://bugzilla.suse.com/1073928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17854",
      },
      {
         cve: "CVE-2017-17855",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17855",
            },
         ],
         notes: [
            {
               category: "general",
               text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17855",
               url: "https://www.suse.com/security/cve/CVE-2017-17855",
            },
            {
               category: "external",
               summary: "SUSE Bug 1073928 for CVE-2017-17855",
               url: "https://bugzilla.suse.com/1073928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17855",
      },
      {
         cve: "CVE-2017-17856",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17856",
            },
         ],
         notes: [
            {
               category: "general",
               text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17856",
               url: "https://www.suse.com/security/cve/CVE-2017-17856",
            },
            {
               category: "external",
               summary: "SUSE Bug 1073928 for CVE-2017-17856",
               url: "https://bugzilla.suse.com/1073928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17856",
      },
      {
         cve: "CVE-2017-17857",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17857",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17857",
               url: "https://www.suse.com/security/cve/CVE-2017-17857",
            },
            {
               category: "external",
               summary: "SUSE Bug 1073928 for CVE-2017-17857",
               url: "https://bugzilla.suse.com/1073928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17857",
      },
      {
         cve: "CVE-2017-17862",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-17862",
            },
         ],
         notes: [
            {
               category: "general",
               text: "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-17862",
               url: "https://www.suse.com/security/cve/CVE-2017-17862",
            },
            {
               category: "external",
               summary: "SUSE Bug 1073928 for CVE-2017-17862",
               url: "https://bugzilla.suse.com/1073928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-17862",
      },
      {
         cve: "CVE-2017-5123",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-5123",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-5123",
               url: "https://www.suse.com/security/cve/CVE-2017-5123",
            },
            {
               category: "external",
               summary: "SUSE Bug 1062473 for CVE-2017-5123",
               url: "https://bugzilla.suse.com/1062473",
            },
            {
               category: "external",
               summary: "SUSE Bug 1122971 for CVE-2017-5123",
               url: "https://bugzilla.suse.com/1122971",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-5123",
      },
      {
         cve: "CVE-2017-5715",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-5715",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-5715",
               url: "https://www.suse.com/security/cve/CVE-2017-5715",
            },
            {
               category: "external",
               summary: "SUSE Bug 1068032 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1068032",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074562 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1074562",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074578 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1074578",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074701 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1074701",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074741 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1074741",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074919 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1074919",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075006 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1075006",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075007 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1075007",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075262 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1075262",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075419 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1075419",
            },
            {
               category: "external",
               summary: "SUSE Bug 1076115 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1076115",
            },
            {
               category: "external",
               summary: "SUSE Bug 1076372 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1076372",
            },
            {
               category: "external",
               summary: "SUSE Bug 1076606 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1076606",
            },
            {
               category: "external",
               summary: "SUSE Bug 1078353 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1078353",
            },
            {
               category: "external",
               summary: "SUSE Bug 1080039 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1080039",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087887 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1087887",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087939 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1087939",
            },
            {
               category: "external",
               summary: "SUSE Bug 1088147 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1088147",
            },
            {
               category: "external",
               summary: "SUSE Bug 1089055 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1089055",
            },
            {
               category: "external",
               summary: "SUSE Bug 1091815 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1091815",
            },
            {
               category: "external",
               summary: "SUSE Bug 1095735 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1095735",
            },
            {
               category: "external",
               summary: "SUSE Bug 1102517 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1102517",
            },
            {
               category: "external",
               summary: "SUSE Bug 1105108 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1105108",
            },
            {
               category: "external",
               summary: "SUSE Bug 1126516 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1126516",
            },
            {
               category: "external",
               summary: "SUSE Bug 1173489 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1173489",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178658 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1178658",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201457 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1201457",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201877 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1201877",
            },
            {
               category: "external",
               summary: "SUSE Bug 1203236 for CVE-2017-5715",
               url: "https://bugzilla.suse.com/1203236",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-5715",
      },
      {
         cve: "CVE-2017-5753",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-5753",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-5753",
               url: "https://www.suse.com/security/cve/CVE-2017-5753",
            },
            {
               category: "external",
               summary: "SUSE Bug 1068032 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1068032",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074562 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1074562",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074578 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1074578",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074701 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1074701",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075006 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1075006",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075419 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1075419",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075748 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1075748",
            },
            {
               category: "external",
               summary: "SUSE Bug 1080039 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1080039",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087084 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1087084",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087939 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1087939",
            },
            {
               category: "external",
               summary: "SUSE Bug 1089055 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1089055",
            },
            {
               category: "external",
               summary: "SUSE Bug 1136865 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1136865",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178658 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1178658",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201877 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1201877",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209547 for CVE-2017-5753",
               url: "https://bugzilla.suse.com/1209547",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-5753",
      },
      {
         cve: "CVE-2017-5754",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-5754",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-5754",
               url: "https://www.suse.com/security/cve/CVE-2017-5754",
            },
            {
               category: "external",
               summary: "SUSE Bug 1068032 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1068032",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074562 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1074562",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074578 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1074578",
            },
            {
               category: "external",
               summary: "SUSE Bug 1074701 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1074701",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075006 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1075006",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075008 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1075008",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087939 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1087939",
            },
            {
               category: "external",
               summary: "SUSE Bug 1089055 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1089055",
            },
            {
               category: "external",
               summary: "SUSE Bug 1115045 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1115045",
            },
            {
               category: "external",
               summary: "SUSE Bug 1136865 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1136865",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178658 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1178658",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201877 for CVE-2017-5754",
               url: "https://bugzilla.suse.com/1201877",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-5754",
      },
      {
         cve: "CVE-2017-7541",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-7541",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-7541",
               url: "https://www.suse.com/security/cve/CVE-2017-7541",
            },
            {
               category: "external",
               summary: "SUSE Bug 1049645 for CVE-2017-7541",
               url: "https://bugzilla.suse.com/1049645",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-7541",
      },
      {
         cve: "CVE-2017-7542",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-7542",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-7542",
               url: "https://www.suse.com/security/cve/CVE-2017-7542",
            },
            {
               category: "external",
               summary: "SUSE Bug 1049882 for CVE-2017-7542",
               url: "https://bugzilla.suse.com/1049882",
            },
            {
               category: "external",
               summary: "SUSE Bug 1061936 for CVE-2017-7542",
               url: "https://bugzilla.suse.com/1061936",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-7542",
      },
      {
         cve: "CVE-2017-8824",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-8824",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-8824",
               url: "https://www.suse.com/security/cve/CVE-2017-8824",
            },
            {
               category: "external",
               summary: "SUSE Bug 1070771 for CVE-2017-8824",
               url: "https://bugzilla.suse.com/1070771",
            },
            {
               category: "external",
               summary: "SUSE Bug 1076734 for CVE-2017-8824",
               url: "https://bugzilla.suse.com/1076734",
            },
            {
               category: "external",
               summary: "SUSE Bug 1092904 for CVE-2017-8824",
               url: "https://bugzilla.suse.com/1092904",
            },
            {
               category: "external",
               summary: "SUSE Bug 1115893 for CVE-2017-8824",
               url: "https://bugzilla.suse.com/1115893",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2017-8824",
      },
      {
         cve: "CVE-2017-8831",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2017-8831",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2017-8831",
               url: "https://www.suse.com/security/cve/CVE-2017-8831",
            },
            {
               category: "external",
               summary: "SUSE Bug 1037994 for CVE-2017-8831",
               url: "https://bugzilla.suse.com/1037994",
            },
            {
               category: "external",
               summary: "SUSE Bug 1061936 for CVE-2017-8831",
               url: "https://bugzilla.suse.com/1061936",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2017-8831",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1115893 for CVE-2017-8831",
               url: "https://bugzilla.suse.com/1115893",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2017-8831",
      },
      {
         cve: "CVE-2018-1000004",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-1000004",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-1000004",
               url: "https://www.suse.com/security/cve/CVE-2018-1000004",
            },
            {
               category: "external",
               summary: "SUSE Bug 1076017 for CVE-2018-1000004",
               url: "https://bugzilla.suse.com/1076017",
            },
            {
               category: "external",
               summary: "SUSE Bug 1091815 for CVE-2018-1000004",
               url: "https://bugzilla.suse.com/1091815",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-1000004",
      },
      {
         cve: "CVE-2018-10322",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-10322",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-10322",
               url: "https://www.suse.com/security/cve/CVE-2018-10322",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2018-10322",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1090749 for CVE-2018-10322",
               url: "https://bugzilla.suse.com/1090749",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-10322",
      },
      {
         cve: "CVE-2018-10323",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-10323",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-10323",
               url: "https://www.suse.com/security/cve/CVE-2018-10323",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2018-10323",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1090717 for CVE-2018-10323",
               url: "https://bugzilla.suse.com/1090717",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-10323",
      },
      {
         cve: "CVE-2018-1068",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-1068",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-1068",
               url: "https://www.suse.com/security/cve/CVE-2018-1068",
            },
            {
               category: "external",
               summary: "SUSE Bug 1085107 for CVE-2018-1068",
               url: "https://bugzilla.suse.com/1085107",
            },
            {
               category: "external",
               summary: "SUSE Bug 1085114 for CVE-2018-1068",
               url: "https://bugzilla.suse.com/1085114",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2018-1068",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1123903 for CVE-2018-1068",
               url: "https://bugzilla.suse.com/1123903",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2018-1068",
      },
      {
         cve: "CVE-2018-1118",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-1118",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-1118",
               url: "https://www.suse.com/security/cve/CVE-2018-1118",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2018-1118",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1092472 for CVE-2018-1118",
               url: "https://bugzilla.suse.com/1092472",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-1118",
      },
      {
         cve: "CVE-2018-12232",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-12232",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-12232",
               url: "https://www.suse.com/security/cve/CVE-2018-12232",
            },
            {
               category: "external",
               summary: "SUSE Bug 1087082 for CVE-2018-12232",
               url: "https://bugzilla.suse.com/1087082",
            },
            {
               category: "external",
               summary: "SUSE Bug 1097593 for CVE-2018-12232",
               url: "https://bugzilla.suse.com/1097593",
            },
            {
               category: "external",
               summary: "SUSE Bug 1125907 for CVE-2018-12232",
               url: "https://bugzilla.suse.com/1125907",
            },
            {
               category: "external",
               summary: "SUSE Bug 1127757 for CVE-2018-12232",
               url: "https://bugzilla.suse.com/1127757",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-12232",
      },
      {
         cve: "CVE-2018-12714",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-12714",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-12714",
               url: "https://www.suse.com/security/cve/CVE-2018-12714",
            },
            {
               category: "external",
               summary: "SUSE Bug 1098933 for CVE-2018-12714",
               url: "https://bugzilla.suse.com/1098933",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2018-12714",
      },
      {
         cve: "CVE-2018-13053",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-13053",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-13053",
               url: "https://www.suse.com/security/cve/CVE-2018-13053",
            },
            {
               category: "external",
               summary: "SUSE Bug 1099924 for CVE-2018-13053",
               url: "https://bugzilla.suse.com/1099924",
            },
            {
               category: "external",
               summary: "SUSE Bug 1115893 for CVE-2018-13053",
               url: "https://bugzilla.suse.com/1115893",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2018-13053",
      },
      {
         cve: "CVE-2018-18710",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-18710",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-18710",
               url: "https://www.suse.com/security/cve/CVE-2018-18710",
            },
            {
               category: "external",
               summary: "SUSE Bug 1113751 for CVE-2018-18710",
               url: "https://bugzilla.suse.com/1113751",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-18710",
      },
      {
         cve: "CVE-2018-19824",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-19824",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-19824",
               url: "https://www.suse.com/security/cve/CVE-2018-19824",
            },
            {
               category: "external",
               summary: "SUSE Bug 1118152 for CVE-2018-19824",
               url: "https://bugzilla.suse.com/1118152",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-19824",
      },
      {
         cve: "CVE-2018-5332",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-5332",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-5332",
               url: "https://www.suse.com/security/cve/CVE-2018-5332",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075621 for CVE-2018-5332",
               url: "https://bugzilla.suse.com/1075621",
            },
            {
               category: "external",
               summary: "SUSE Bug 1091815 for CVE-2018-5332",
               url: "https://bugzilla.suse.com/1091815",
            },
            {
               category: "external",
               summary: "SUSE Bug 1115893 for CVE-2018-5332",
               url: "https://bugzilla.suse.com/1115893",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.6,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2018-5332",
      },
      {
         cve: "CVE-2018-5333",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-5333",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-5333",
               url: "https://www.suse.com/security/cve/CVE-2018-5333",
            },
            {
               category: "external",
               summary: "SUSE Bug 1075617 for CVE-2018-5333",
               url: "https://bugzilla.suse.com/1075617",
            },
            {
               category: "external",
               summary: "SUSE Bug 1091815 for CVE-2018-5333",
               url: "https://bugzilla.suse.com/1091815",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 2.9,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2018-5333",
      },
      {
         cve: "CVE-2018-8043",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-8043",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-8043",
               url: "https://www.suse.com/security/cve/CVE-2018-8043",
            },
            {
               category: "external",
               summary: "SUSE Bug 1084829 for CVE-2018-8043",
               url: "https://bugzilla.suse.com/1084829",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 0,
                  baseSeverity: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2018-8043",
      },
      {
         cve: "CVE-2018-8087",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-8087",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-8087",
               url: "https://www.suse.com/security/cve/CVE-2018-8087",
            },
            {
               category: "external",
               summary: "SUSE Bug 1085053 for CVE-2018-8087",
               url: "https://bugzilla.suse.com/1085053",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-8087",
      },
      {
         cve: "CVE-2018-8822",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-8822",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-8822",
               url: "https://www.suse.com/security/cve/CVE-2018-8822",
            },
            {
               category: "external",
               summary: "SUSE Bug 1086162 for CVE-2018-8822",
               url: "https://bugzilla.suse.com/1086162",
            },
            {
               category: "external",
               summary: "SUSE Bug 1090404 for CVE-2018-8822",
               url: "https://bugzilla.suse.com/1090404",
            },
            {
               category: "external",
               summary: "SUSE Bug 1091815 for CVE-2018-8822",
               url: "https://bugzilla.suse.com/1091815",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-8822",
      },
      {
         cve: "CVE-2019-10207",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-10207",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-10207",
               url: "https://www.suse.com/security/cve/CVE-2019-10207",
            },
            {
               category: "external",
               summary: "SUSE Bug 1123959 for CVE-2019-10207",
               url: "https://bugzilla.suse.com/1123959",
            },
            {
               category: "external",
               summary: "SUSE Bug 1142857 for CVE-2019-10207",
               url: "https://bugzilla.suse.com/1142857",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-10207",
      },
      {
         cve: "CVE-2019-11477",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-11477",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-11477",
               url: "https://www.suse.com/security/cve/CVE-2019-11477",
            },
            {
               category: "external",
               summary: "SUSE Bug 1132686 for CVE-2019-11477",
               url: "https://bugzilla.suse.com/1132686",
            },
            {
               category: "external",
               summary: "SUSE Bug 1137586 for CVE-2019-11477",
               url: "https://bugzilla.suse.com/1137586",
            },
            {
               category: "external",
               summary: "SUSE Bug 1142129 for CVE-2019-11477",
               url: "https://bugzilla.suse.com/1142129",
            },
            {
               category: "external",
               summary: "SUSE Bug 1153242 for CVE-2019-11477",
               url: "https://bugzilla.suse.com/1153242",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-11477",
      },
      {
         cve: "CVE-2019-11478",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-11478",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-11478",
               url: "https://www.suse.com/security/cve/CVE-2019-11478",
            },
            {
               category: "external",
               summary: "SUSE Bug 1132686 for CVE-2019-11478",
               url: "https://bugzilla.suse.com/1132686",
            },
            {
               category: "external",
               summary: "SUSE Bug 1137586 for CVE-2019-11478",
               url: "https://bugzilla.suse.com/1137586",
            },
            {
               category: "external",
               summary: "SUSE Bug 1142129 for CVE-2019-11478",
               url: "https://bugzilla.suse.com/1142129",
            },
            {
               category: "external",
               summary: "SUSE Bug 1143542 for CVE-2019-11478",
               url: "https://bugzilla.suse.com/1143542",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-11478",
      },
      {
         cve: "CVE-2019-11479",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-11479",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-11479",
               url: "https://www.suse.com/security/cve/CVE-2019-11479",
            },
            {
               category: "external",
               summary: "SUSE Bug 1132686 for CVE-2019-11479",
               url: "https://bugzilla.suse.com/1132686",
            },
            {
               category: "external",
               summary: "SUSE Bug 1137586 for CVE-2019-11479",
               url: "https://bugzilla.suse.com/1137586",
            },
            {
               category: "external",
               summary: "SUSE Bug 1142129 for CVE-2019-11479",
               url: "https://bugzilla.suse.com/1142129",
            },
            {
               category: "external",
               summary: "SUSE Bug 1143542 for CVE-2019-11479",
               url: "https://bugzilla.suse.com/1143542",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-11479",
      },
      {
         cve: "CVE-2019-14615",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-14615",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-14615",
               url: "https://www.suse.com/security/cve/CVE-2019-14615",
            },
            {
               category: "external",
               summary: "SUSE Bug 1160195 for CVE-2019-14615",
               url: "https://bugzilla.suse.com/1160195",
            },
            {
               category: "external",
               summary: "SUSE Bug 1165881 for CVE-2019-14615",
               url: "https://bugzilla.suse.com/1165881",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-14615",
      },
      {
         cve: "CVE-2019-14814",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-14814",
            },
         ],
         notes: [
            {
               category: "general",
               text: "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-14814",
               url: "https://www.suse.com/security/cve/CVE-2019-14814",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146512 for CVE-2019-14814",
               url: "https://bugzilla.suse.com/1146512",
            },
            {
               category: "external",
               summary: "SUSE Bug 1173664 for CVE-2019-14814",
               url: "https://bugzilla.suse.com/1173664",
            },
            {
               category: "external",
               summary: "SUSE Bug 1173665 for CVE-2019-14814",
               url: "https://bugzilla.suse.com/1173665",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-14814",
      },
      {
         cve: "CVE-2019-14896",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-14896",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-14896",
               url: "https://www.suse.com/security/cve/CVE-2019-14896",
            },
            {
               category: "external",
               summary: "SUSE Bug 1157157 for CVE-2019-14896",
               url: "https://bugzilla.suse.com/1157157",
            },
            {
               category: "external",
               summary: "SUSE Bug 1160468 for CVE-2019-14896",
               url: "https://bugzilla.suse.com/1160468",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-14896",
      },
      {
         cve: "CVE-2019-15030",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-15030",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-15030",
               url: "https://www.suse.com/security/cve/CVE-2019-15030",
            },
            {
               category: "external",
               summary: "SUSE Bug 1149713 for CVE-2019-15030",
               url: "https://bugzilla.suse.com/1149713",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-15030",
      },
      {
         cve: "CVE-2019-15031",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-15031",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-15031",
               url: "https://www.suse.com/security/cve/CVE-2019-15031",
            },
            {
               category: "external",
               summary: "SUSE Bug 1149713 for CVE-2019-15031",
               url: "https://bugzilla.suse.com/1149713",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-15031",
      },
      {
         cve: "CVE-2019-15098",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-15098",
            },
         ],
         notes: [
            {
               category: "general",
               text: "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-15098",
               url: "https://www.suse.com/security/cve/CVE-2019-15098",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146378 for CVE-2019-15098",
               url: "https://bugzilla.suse.com/1146378",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146543 for CVE-2019-15098",
               url: "https://bugzilla.suse.com/1146543",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-15098",
      },
      {
         cve: "CVE-2019-15099",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-15099",
            },
         ],
         notes: [
            {
               category: "general",
               text: "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-15099",
               url: "https://www.suse.com/security/cve/CVE-2019-15099",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146368 for CVE-2019-15099",
               url: "https://bugzilla.suse.com/1146368",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-15099",
      },
      {
         cve: "CVE-2019-15290",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-15290",
            },
         ],
         notes: [
            {
               category: "general",
               text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-15290",
               url: "https://www.suse.com/security/cve/CVE-2019-15290",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146378 for CVE-2019-15290",
               url: "https://bugzilla.suse.com/1146378",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146519 for CVE-2019-15290",
               url: "https://bugzilla.suse.com/1146519",
            },
            {
               category: "external",
               summary: "SUSE Bug 1146543 for CVE-2019-15290",
               url: "https://bugzilla.suse.com/1146543",
            },
            {
               category: "external",
               summary: "SUSE Bug 1158381 for CVE-2019-15290",
               url: "https://bugzilla.suse.com/1158381",
            },
            {
               category: "external",
               summary: "SUSE Bug 1158834 for CVE-2019-15290",
               url: "https://bugzilla.suse.com/1158834",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-15290",
      },
      {
         cve: "CVE-2019-15504",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-15504",
            },
         ],
         notes: [
            {
               category: "general",
               text: "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-15504",
               url: "https://www.suse.com/security/cve/CVE-2019-15504",
            },
            {
               category: "external",
               summary: "SUSE Bug 1147116 for CVE-2019-15504",
               url: "https://bugzilla.suse.com/1147116",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185852 for CVE-2019-15504",
               url: "https://bugzilla.suse.com/1185852",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-15504",
      },
      {
         cve: "CVE-2019-15902",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-15902",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-15902",
               url: "https://www.suse.com/security/cve/CVE-2019-15902",
            },
            {
               category: "external",
               summary: "SUSE Bug 1149376 for CVE-2019-15902",
               url: "https://bugzilla.suse.com/1149376",
            },
            {
               category: "external",
               summary: "SUSE Bug 1155131 for CVE-2019-15902",
               url: "https://bugzilla.suse.com/1155131",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-15902",
      },
      {
         cve: "CVE-2019-16231",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-16231",
            },
         ],
         notes: [
            {
               category: "general",
               text: "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-16231",
               url: "https://www.suse.com/security/cve/CVE-2019-16231",
            },
            {
               category: "external",
               summary: "SUSE Bug 1150466 for CVE-2019-16231",
               url: "https://bugzilla.suse.com/1150466",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2019-16231",
      },
      {
         cve: "CVE-2019-16232",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-16232",
            },
         ],
         notes: [
            {
               category: "general",
               text: "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-16232",
               url: "https://www.suse.com/security/cve/CVE-2019-16232",
            },
            {
               category: "external",
               summary: "SUSE Bug 1150465 for CVE-2019-16232",
               url: "https://bugzilla.suse.com/1150465",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2019-16232",
      },
      {
         cve: "CVE-2019-16234",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-16234",
            },
         ],
         notes: [
            {
               category: "general",
               text: "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-16234",
               url: "https://www.suse.com/security/cve/CVE-2019-16234",
            },
            {
               category: "external",
               summary: "SUSE Bug 1150452 for CVE-2019-16234",
               url: "https://bugzilla.suse.com/1150452",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2019-16234",
      },
      {
         cve: "CVE-2019-17133",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-17133",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-17133",
               url: "https://www.suse.com/security/cve/CVE-2019-17133",
            },
            {
               category: "external",
               summary: "SUSE Bug 1153158 for CVE-2019-17133",
               url: "https://bugzilla.suse.com/1153158",
            },
            {
               category: "external",
               summary: "SUSE Bug 1153161 for CVE-2019-17133",
               url: "https://bugzilla.suse.com/1153161",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-17133",
      },
      {
         cve: "CVE-2019-17666",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-17666",
            },
         ],
         notes: [
            {
               category: "general",
               text: "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-17666",
               url: "https://www.suse.com/security/cve/CVE-2019-17666",
            },
            {
               category: "external",
               summary: "SUSE Bug 1154372 for CVE-2019-17666",
               url: "https://bugzilla.suse.com/1154372",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-17666",
      },
      {
         cve: "CVE-2019-18808",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-18808",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-18808",
               url: "https://www.suse.com/security/cve/CVE-2019-18808",
            },
            {
               category: "external",
               summary: "SUSE Bug 1156259 for CVE-2019-18808",
               url: "https://bugzilla.suse.com/1156259",
            },
            {
               category: "external",
               summary: "SUSE Bug 1189884 for CVE-2019-18808",
               url: "https://bugzilla.suse.com/1189884",
            },
            {
               category: "external",
               summary: "SUSE Bug 1190534 for CVE-2019-18808",
               url: "https://bugzilla.suse.com/1190534",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-18808",
      },
      {
         cve: "CVE-2019-18812",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-18812",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-18812",
               url: "https://www.suse.com/security/cve/CVE-2019-18812",
            },
            {
               category: "external",
               summary: "SUSE Bug 1156277 for CVE-2019-18812",
               url: "https://bugzilla.suse.com/1156277",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-18812",
      },
      {
         cve: "CVE-2019-18813",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-18813",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-18813",
               url: "https://www.suse.com/security/cve/CVE-2019-18813",
            },
            {
               category: "external",
               summary: "SUSE Bug 1156278 for CVE-2019-18813",
               url: "https://bugzilla.suse.com/1156278",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-18813",
      },
      {
         cve: "CVE-2019-19252",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-19252",
            },
         ],
         notes: [
            {
               category: "general",
               text: "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-19252",
               url: "https://www.suse.com/security/cve/CVE-2019-19252",
            },
            {
               category: "external",
               summary: "SUSE Bug 1157813 for CVE-2019-19252",
               url: "https://bugzilla.suse.com/1157813",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-19252",
      },
      {
         cve: "CVE-2019-19332",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-19332",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-19332",
               url: "https://www.suse.com/security/cve/CVE-2019-19332",
            },
            {
               category: "external",
               summary: "SUSE Bug 1158827 for CVE-2019-19332",
               url: "https://bugzilla.suse.com/1158827",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-19332",
      },
      {
         cve: "CVE-2019-19338",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-19338",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-19338",
               url: "https://www.suse.com/security/cve/CVE-2019-19338",
            },
            {
               category: "external",
               summary: "SUSE Bug 1158954 for CVE-2019-19338",
               url: "https://bugzilla.suse.com/1158954",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-19338",
      },
      {
         cve: "CVE-2019-3016",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-3016",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-3016",
               url: "https://www.suse.com/security/cve/CVE-2019-3016",
            },
            {
               category: "external",
               summary: "SUSE Bug 1159281 for CVE-2019-3016",
               url: "https://bugzilla.suse.com/1159281",
            },
            {
               category: "external",
               summary: "SUSE Bug 1161154 for CVE-2019-3016",
               url: "https://bugzilla.suse.com/1161154",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-3016",
      },
      {
         cve: "CVE-2019-3846",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-3846",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-3846",
               url: "https://www.suse.com/security/cve/CVE-2019-3846",
            },
            {
               category: "external",
               summary: "SUSE Bug 1136424 for CVE-2019-3846",
               url: "https://bugzilla.suse.com/1136424",
            },
            {
               category: "external",
               summary: "SUSE Bug 1136446 for CVE-2019-3846",
               url: "https://bugzilla.suse.com/1136446",
            },
            {
               category: "external",
               summary: "SUSE Bug 1156330 for CVE-2019-3846",
               url: "https://bugzilla.suse.com/1156330",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-3846",
      },
      {
         cve: "CVE-2019-3882",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-3882",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-3882",
               url: "https://www.suse.com/security/cve/CVE-2019-3882",
            },
            {
               category: "external",
               summary: "SUSE Bug 1131416 for CVE-2019-3882",
               url: "https://bugzilla.suse.com/1131416",
            },
            {
               category: "external",
               summary: "SUSE Bug 1131427 for CVE-2019-3882",
               url: "https://bugzilla.suse.com/1131427",
            },
            {
               category: "external",
               summary: "SUSE Bug 1133319 for CVE-2019-3882",
               url: "https://bugzilla.suse.com/1133319",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-3882",
      },
      {
         cve: "CVE-2019-3887",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-3887",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-3887",
               url: "https://www.suse.com/security/cve/CVE-2019-3887",
            },
            {
               category: "external",
               summary: "SUSE Bug 1131800 for CVE-2019-3887",
               url: "https://bugzilla.suse.com/1131800",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-3887",
      },
      {
         cve: "CVE-2019-6974",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-6974",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-6974",
               url: "https://www.suse.com/security/cve/CVE-2019-6974",
            },
            {
               category: "external",
               summary: "SUSE Bug 1124728 for CVE-2019-6974",
               url: "https://bugzilla.suse.com/1124728",
            },
            {
               category: "external",
               summary: "SUSE Bug 1124729 for CVE-2019-6974",
               url: "https://bugzilla.suse.com/1124729",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-6974",
      },
      {
         cve: "CVE-2019-7221",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-7221",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-7221",
               url: "https://www.suse.com/security/cve/CVE-2019-7221",
            },
            {
               category: "external",
               summary: "SUSE Bug 1124732 for CVE-2019-7221",
               url: "https://bugzilla.suse.com/1124732",
            },
            {
               category: "external",
               summary: "SUSE Bug 1124734 for CVE-2019-7221",
               url: "https://bugzilla.suse.com/1124734",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-7221",
      },
      {
         cve: "CVE-2019-7222",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-7222",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-7222",
               url: "https://www.suse.com/security/cve/CVE-2019-7222",
            },
            {
               category: "external",
               summary: "SUSE Bug 1124735 for CVE-2019-7222",
               url: "https://bugzilla.suse.com/1124735",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 2.8,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2019-7222",
      },
      {
         cve: "CVE-2019-8564",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-8564",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-8564",
               url: "https://www.suse.com/security/cve/CVE-2019-8564",
            },
            {
               category: "external",
               summary: "SUSE Bug 1132673 for CVE-2019-8564",
               url: "https://bugzilla.suse.com/1132673",
            },
            {
               category: "external",
               summary: "SUSE Bug 1132828 for CVE-2019-8564",
               url: "https://bugzilla.suse.com/1132828",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-8564",
      },
      {
         cve: "CVE-2019-8912",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-8912",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-8912",
               url: "https://www.suse.com/security/cve/CVE-2019-8912",
            },
            {
               category: "external",
               summary: "SUSE Bug 1125907 for CVE-2019-8912",
               url: "https://bugzilla.suse.com/1125907",
            },
            {
               category: "external",
               summary: "SUSE Bug 1126284 for CVE-2019-8912",
               url: "https://bugzilla.suse.com/1126284",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2019-8912",
      },
      {
         cve: "CVE-2019-9500",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-9500",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-9500",
               url: "https://www.suse.com/security/cve/CVE-2019-9500",
            },
            {
               category: "external",
               summary: "SUSE Bug 1132681 for CVE-2019-9500",
               url: "https://bugzilla.suse.com/1132681",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-9500",
      },
      {
         cve: "CVE-2020-10135",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-10135",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-10135",
               url: "https://www.suse.com/security/cve/CVE-2020-10135",
            },
            {
               category: "external",
               summary: "SUSE Bug 1171988 for CVE-2020-10135",
               url: "https://bugzilla.suse.com/1171988",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-10135",
      },
      {
         cve: "CVE-2020-10766",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-10766",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-10766",
               url: "https://www.suse.com/security/cve/CVE-2020-10766",
            },
            {
               category: "external",
               summary: "SUSE Bug 1159281 for CVE-2020-10766",
               url: "https://bugzilla.suse.com/1159281",
            },
            {
               category: "external",
               summary: "SUSE Bug 1172781 for CVE-2020-10766",
               url: "https://bugzilla.suse.com/1172781",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.6,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-10766",
      },
      {
         cve: "CVE-2020-10767",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-10767",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-10767",
               url: "https://www.suse.com/security/cve/CVE-2020-10767",
            },
            {
               category: "external",
               summary: "SUSE Bug 1159281 for CVE-2020-10767",
               url: "https://bugzilla.suse.com/1159281",
            },
            {
               category: "external",
               summary: "SUSE Bug 1172782 for CVE-2020-10767",
               url: "https://bugzilla.suse.com/1172782",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-10767",
      },
      {
         cve: "CVE-2020-10768",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-10768",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-10768",
               url: "https://www.suse.com/security/cve/CVE-2020-10768",
            },
            {
               category: "external",
               summary: "SUSE Bug 1159281 for CVE-2020-10768",
               url: "https://bugzilla.suse.com/1159281",
            },
            {
               category: "external",
               summary: "SUSE Bug 1172783 for CVE-2020-10768",
               url: "https://bugzilla.suse.com/1172783",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-10768",
      },
      {
         cve: "CVE-2020-12351",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-12351",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-12351",
               url: "https://www.suse.com/security/cve/CVE-2020-12351",
            },
            {
               category: "external",
               summary: "SUSE Bug 1177724 for CVE-2020-12351",
               url: "https://bugzilla.suse.com/1177724",
            },
            {
               category: "external",
               summary: "SUSE Bug 1177729 for CVE-2020-12351",
               url: "https://bugzilla.suse.com/1177729",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178397 for CVE-2020-12351",
               url: "https://bugzilla.suse.com/1178397",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-12351",
      },
      {
         cve: "CVE-2020-12352",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-12352",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-12352",
               url: "https://www.suse.com/security/cve/CVE-2020-12352",
            },
            {
               category: "external",
               summary: "SUSE Bug 1177725 for CVE-2020-12352",
               url: "https://bugzilla.suse.com/1177725",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178398 for CVE-2020-12352",
               url: "https://bugzilla.suse.com/1178398",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.1,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-12352",
      },
      {
         cve: "CVE-2020-14331",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-14331",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-14331",
               url: "https://www.suse.com/security/cve/CVE-2020-14331",
            },
            {
               category: "external",
               summary: "SUSE Bug 1174205 for CVE-2020-14331",
               url: "https://bugzilla.suse.com/1174205",
            },
            {
               category: "external",
               summary: "SUSE Bug 1174247 for CVE-2020-14331",
               url: "https://bugzilla.suse.com/1174247",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-14331",
      },
      {
         cve: "CVE-2020-14386",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-14386",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-14386",
               url: "https://www.suse.com/security/cve/CVE-2020-14386",
            },
            {
               category: "external",
               summary: "SUSE Bug 1176069 for CVE-2020-14386",
               url: "https://bugzilla.suse.com/1176069",
            },
            {
               category: "external",
               summary: "SUSE Bug 1176072 for CVE-2020-14386",
               url: "https://bugzilla.suse.com/1176072",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-14386",
      },
      {
         cve: "CVE-2020-24586",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-24586",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-24586",
               url: "https://www.suse.com/security/cve/CVE-2020-24586",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185859 for CVE-2020-24586",
               url: "https://bugzilla.suse.com/1185859",
            },
            {
               category: "external",
               summary: "SUSE Bug 1192868 for CVE-2020-24586",
               url: "https://bugzilla.suse.com/1192868",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-24586",
      },
      {
         cve: "CVE-2020-24587",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-24587",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-24587",
               url: "https://www.suse.com/security/cve/CVE-2020-24587",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185859 for CVE-2020-24587",
               url: "https://bugzilla.suse.com/1185859",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185862 for CVE-2020-24587",
               url: "https://bugzilla.suse.com/1185862",
            },
            {
               category: "external",
               summary: "SUSE Bug 1192868 for CVE-2020-24587",
               url: "https://bugzilla.suse.com/1192868",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-24587",
      },
      {
         cve: "CVE-2020-24588",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-24588",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-24588",
               url: "https://www.suse.com/security/cve/CVE-2020-24588",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185861 for CVE-2020-24588",
               url: "https://bugzilla.suse.com/1185861",
            },
            {
               category: "external",
               summary: "SUSE Bug 1192868 for CVE-2020-24588",
               url: "https://bugzilla.suse.com/1192868",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199701 for CVE-2020-24588",
               url: "https://bugzilla.suse.com/1199701",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-24588",
      },
      {
         cve: "CVE-2020-25639",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-25639",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-25639",
               url: "https://www.suse.com/security/cve/CVE-2020-25639",
            },
            {
               category: "external",
               summary: "SUSE Bug 1176846 for CVE-2020-25639",
               url: "https://bugzilla.suse.com/1176846",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-25639",
      },
      {
         cve: "CVE-2020-25656",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-25656",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-25656",
               url: "https://www.suse.com/security/cve/CVE-2020-25656",
            },
            {
               category: "external",
               summary: "SUSE Bug 1177766 for CVE-2020-25656",
               url: "https://bugzilla.suse.com/1177766",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-25656",
      },
      {
         cve: "CVE-2020-25668",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-25668",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-25668",
               url: "https://www.suse.com/security/cve/CVE-2020-25668",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178123 for CVE-2020-25668",
               url: "https://bugzilla.suse.com/1178123",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178622 for CVE-2020-25668",
               url: "https://bugzilla.suse.com/1178622",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196914 for CVE-2020-25668",
               url: "https://bugzilla.suse.com/1196914",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-25668",
      },
      {
         cve: "CVE-2020-26141",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-26141",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-26141",
               url: "https://www.suse.com/security/cve/CVE-2020-26141",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185987 for CVE-2020-26141",
               url: "https://bugzilla.suse.com/1185987",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-26141",
      },
      {
         cve: "CVE-2020-2732",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-2732",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-2732",
               url: "https://www.suse.com/security/cve/CVE-2020-2732",
            },
            {
               category: "external",
               summary: "SUSE Bug 1163971 for CVE-2020-2732",
               url: "https://bugzilla.suse.com/1163971",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.2,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2020-2732",
      },
      {
         cve: "CVE-2020-29660",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-29660",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-29660",
               url: "https://www.suse.com/security/cve/CVE-2020-29660",
            },
            {
               category: "external",
               summary: "SUSE Bug 1179745 for CVE-2020-29660",
               url: "https://bugzilla.suse.com/1179745",
            },
            {
               category: "external",
               summary: "SUSE Bug 1179877 for CVE-2020-29660",
               url: "https://bugzilla.suse.com/1179877",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-29660",
      },
      {
         cve: "CVE-2020-29661",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-29661",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-29661",
               url: "https://www.suse.com/security/cve/CVE-2020-29661",
            },
            {
               category: "external",
               summary: "SUSE Bug 1179745 for CVE-2020-29661",
               url: "https://bugzilla.suse.com/1179745",
            },
            {
               category: "external",
               summary: "SUSE Bug 1179877 for CVE-2020-29661",
               url: "https://bugzilla.suse.com/1179877",
            },
            {
               category: "external",
               summary: "SUSE Bug 1214268 for CVE-2020-29661",
               url: "https://bugzilla.suse.com/1214268",
            },
            {
               category: "external",
               summary: "SUSE Bug 1218966 for CVE-2020-29661",
               url: "https://bugzilla.suse.com/1218966",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-29661",
      },
      {
         cve: "CVE-2020-8648",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-8648",
            },
         ],
         notes: [
            {
               category: "general",
               text: "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-8648",
               url: "https://www.suse.com/security/cve/CVE-2020-8648",
            },
            {
               category: "external",
               summary: "SUSE Bug 1162928 for CVE-2020-8648",
               url: "https://bugzilla.suse.com/1162928",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-8648",
      },
      {
         cve: "CVE-2020-8694",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-8694",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-8694",
               url: "https://www.suse.com/security/cve/CVE-2020-8694",
            },
            {
               category: "external",
               summary: "SUSE Bug 1170415 for CVE-2020-8694",
               url: "https://bugzilla.suse.com/1170415",
            },
            {
               category: "external",
               summary: "SUSE Bug 1170446 for CVE-2020-8694",
               url: "https://bugzilla.suse.com/1170446",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178591 for CVE-2020-8694",
               url: "https://bugzilla.suse.com/1178591",
            },
            {
               category: "external",
               summary: "SUSE Bug 1178700 for CVE-2020-8694",
               url: "https://bugzilla.suse.com/1178700",
            },
            {
               category: "external",
               summary: "SUSE Bug 1179661 for CVE-2020-8694",
               url: "https://bugzilla.suse.com/1179661",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-8694",
      },
      {
         cve: "CVE-2021-23133",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-23133",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-23133",
               url: "https://www.suse.com/security/cve/CVE-2021-23133",
            },
            {
               category: "external",
               summary: "SUSE Bug 1184675 for CVE-2021-23133",
               url: "https://bugzilla.suse.com/1184675",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185901 for CVE-2021-23133",
               url: "https://bugzilla.suse.com/1185901",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-23133",
      },
      {
         cve: "CVE-2021-26708",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-26708",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-26708",
               url: "https://www.suse.com/security/cve/CVE-2021-26708",
            },
            {
               category: "external",
               summary: "SUSE Bug 1181806 for CVE-2021-26708",
               url: "https://bugzilla.suse.com/1181806",
            },
            {
               category: "external",
               summary: "SUSE Bug 1183298 for CVE-2021-26708",
               url: "https://bugzilla.suse.com/1183298",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-26708",
      },
      {
         cve: "CVE-2021-28971",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-28971",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-28971",
               url: "https://www.suse.com/security/cve/CVE-2021-28971",
            },
            {
               category: "external",
               summary: "SUSE Bug 1184196 for CVE-2021-28971",
               url: "https://bugzilla.suse.com/1184196",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-28971",
      },
      {
         cve: "CVE-2021-32606",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-32606",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-32606",
               url: "https://www.suse.com/security/cve/CVE-2021-32606",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185953 for CVE-2021-32606",
               url: "https://bugzilla.suse.com/1185953",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-32606",
      },
      {
         cve: "CVE-2021-33909",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-33909",
            },
         ],
         notes: [
            {
               category: "general",
               text: "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-33909",
               url: "https://www.suse.com/security/cve/CVE-2021-33909",
            },
            {
               category: "external",
               summary: "SUSE Bug 1188062 for CVE-2021-33909",
               url: "https://bugzilla.suse.com/1188062",
            },
            {
               category: "external",
               summary: "SUSE Bug 1188063 for CVE-2021-33909",
               url: "https://bugzilla.suse.com/1188063",
            },
            {
               category: "external",
               summary: "SUSE Bug 1188257 for CVE-2021-33909",
               url: "https://bugzilla.suse.com/1188257",
            },
            {
               category: "external",
               summary: "SUSE Bug 1189302 for CVE-2021-33909",
               url: "https://bugzilla.suse.com/1189302",
            },
            {
               category: "external",
               summary: "SUSE Bug 1190859 for CVE-2021-33909",
               url: "https://bugzilla.suse.com/1190859",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-33909",
      },
      {
         cve: "CVE-2021-3483",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3483",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3483",
               url: "https://www.suse.com/security/cve/CVE-2021-3483",
            },
            {
               category: "external",
               summary: "SUSE Bug 1184393 for CVE-2021-3483",
               url: "https://bugzilla.suse.com/1184393",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-3483",
      },
      {
         cve: "CVE-2021-3489",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3489",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3489",
               url: "https://www.suse.com/security/cve/CVE-2021-3489",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185640 for CVE-2021-3489",
               url: "https://bugzilla.suse.com/1185640",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185856 for CVE-2021-3489",
               url: "https://bugzilla.suse.com/1185856",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-3489",
      },
      {
         cve: "CVE-2021-3490",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3490",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3490",
               url: "https://www.suse.com/security/cve/CVE-2021-3490",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185641 for CVE-2021-3490",
               url: "https://bugzilla.suse.com/1185641",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185796 for CVE-2021-3490",
               url: "https://bugzilla.suse.com/1185796",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-3490",
      },
      {
         cve: "CVE-2021-3491",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3491",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3491",
               url: "https://www.suse.com/security/cve/CVE-2021-3491",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185642 for CVE-2021-3491",
               url: "https://bugzilla.suse.com/1185642",
            },
            {
               category: "external",
               summary: "SUSE Bug 1187090 for CVE-2021-3491",
               url: "https://bugzilla.suse.com/1187090",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-3491",
      },
      {
         cve: "CVE-2021-3640",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3640",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3640",
               url: "https://www.suse.com/security/cve/CVE-2021-3640",
            },
            {
               category: "external",
               summary: "SUSE Bug 1188172 for CVE-2021-3640",
               url: "https://bugzilla.suse.com/1188172",
            },
            {
               category: "external",
               summary: "SUSE Bug 1188613 for CVE-2021-3640",
               url: "https://bugzilla.suse.com/1188613",
            },
            {
               category: "external",
               summary: "SUSE Bug 1191530 for CVE-2021-3640",
               url: "https://bugzilla.suse.com/1191530",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196810 for CVE-2021-3640",
               url: "https://bugzilla.suse.com/1196810",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196914 for CVE-2021-3640",
               url: "https://bugzilla.suse.com/1196914",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-3640",
      },
      {
         cve: "CVE-2021-3653",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3653",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3653",
               url: "https://www.suse.com/security/cve/CVE-2021-3653",
            },
            {
               category: "external",
               summary: "SUSE Bug 1189399 for CVE-2021-3653",
               url: "https://bugzilla.suse.com/1189399",
            },
            {
               category: "external",
               summary: "SUSE Bug 1189420 for CVE-2021-3653",
               url: "https://bugzilla.suse.com/1189420",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196914 for CVE-2021-3653",
               url: "https://bugzilla.suse.com/1196914",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-3653",
      },
      {
         cve: "CVE-2021-3656",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3656",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3656",
               url: "https://www.suse.com/security/cve/CVE-2021-3656",
            },
            {
               category: "external",
               summary: "SUSE Bug 1189400 for CVE-2021-3656",
               url: "https://bugzilla.suse.com/1189400",
            },
            {
               category: "external",
               summary: "SUSE Bug 1189418 for CVE-2021-3656",
               url: "https://bugzilla.suse.com/1189418",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-3656",
      },
      {
         cve: "CVE-2021-3744",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3744",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3744",
               url: "https://www.suse.com/security/cve/CVE-2021-3744",
            },
            {
               category: "external",
               summary: "SUSE Bug 1189884 for CVE-2021-3744",
               url: "https://bugzilla.suse.com/1189884",
            },
            {
               category: "external",
               summary: "SUSE Bug 1190534 for CVE-2021-3744",
               url: "https://bugzilla.suse.com/1190534",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-3744",
      },
      {
         cve: "CVE-2021-3753",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3753",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3753",
               url: "https://www.suse.com/security/cve/CVE-2021-3753",
            },
            {
               category: "external",
               summary: "SUSE Bug 1190025 for CVE-2021-3753",
               url: "https://bugzilla.suse.com/1190025",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 2.9,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2021-3753",
      },
      {
         cve: "CVE-2021-37576",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-37576",
            },
         ],
         notes: [
            {
               category: "general",
               text: "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-37576",
               url: "https://www.suse.com/security/cve/CVE-2021-37576",
            },
            {
               category: "external",
               summary: "SUSE Bug 1188838 for CVE-2021-37576",
               url: "https://bugzilla.suse.com/1188838",
            },
            {
               category: "external",
               summary: "SUSE Bug 1188842 for CVE-2021-37576",
               url: "https://bugzilla.suse.com/1188842",
            },
            {
               category: "external",
               summary: "SUSE Bug 1190276 for CVE-2021-37576",
               url: "https://bugzilla.suse.com/1190276",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-37576",
      },
      {
         cve: "CVE-2021-3759",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3759",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A memory overflow vulnerability was found in the Linux kernel's ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3759",
               url: "https://www.suse.com/security/cve/CVE-2021-3759",
            },
            {
               category: "external",
               summary: "SUSE Bug 1190115 for CVE-2021-3759",
               url: "https://bugzilla.suse.com/1190115",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-3759",
      },
      {
         cve: "CVE-2021-38166",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-38166",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
               "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-38166",
               url: "https://www.suse.com/security/cve/CVE-2021-38166",
            },
            {
               category: "external",
               summary: "SUSE Bug 1189233 for CVE-2021-38166",
               url: "https://bugzilla.suse.com/1189233",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
                  "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-38166",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.