Vulnerability from csaf_suse
Published
2022-04-12 12:59
Modified
2022-04-12 12:59
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823) - CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227) - CVE-2022-1199: Fixed null-ptr-deref and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198028) - CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027) - CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030). - CVE-2022-1195: Fixed an use-after-free vulnerability which could allow a local attacker with a user privilege to execute a denial of service. (bsc#1198029) - CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033) - CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032) - CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031) - CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331) - CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702) - CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761) - CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462) - CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366) - CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343) - CVE-2022-27223: Fixed an out-of-array access in /usb/gadget/udc/udc-xilinx.c. (bsc#1197245) - CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956) - CVE-2021-45402: Fixed a pointer leak in check_alu_op() of kernel/bpf/verifier.c. (bsc#1196130). - CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488) The following non-security bugs were fixed: - ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes). - ACPI: APEI: fix return value of __setup handlers (git-fixes). - ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes). - ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes). - ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes). - ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes). - ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes). - ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes). - ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes). - ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes). - ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes). - ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes). - ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes). - ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes). - ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes). - ALSA: spi: Add check for clk_enable() (git-fixes). - ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes). - ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes). - ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes). - ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes). - ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes). - ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes). - ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes). - ASoC: fsi: Add check for clk_enable (git-fixes). - ASoC: fsl_spdif: Disable TX clock when stop (git-fixes). - ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes). - ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes). - ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes). - ASoC: mxs-saif: Handle errors for clk_enable (git-fixes). - ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes). - ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes). - ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes). - ASoC: SOF: topology: remove redundant code (git-fixes). - ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes). - ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes). - ASoC: topology: Allow TLV control to be either read or write (git-fixes). - ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes). - ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes). - ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes). - ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes). - ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018). - block: update io_ticks when io hang (bsc#1197817). - block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819). - bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes). - bpf: Remove config check to enable bpf support for branch records (git-fixes bsc#1177028). - btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1194649). - btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1194649). - btrfs: avoid unnecessary logging of xattrs during fast fsyncs (bsc#1194649). - btrfs: check error value from btrfs_update_inode in tree log (bsc#1194649). - btrfs: check if a log root exists before locking the log_mutex on unlink (bsc#1194649). - btrfs: check if a log tree exists at inode_logged() (bsc#1194649). - btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1194649). - btrfs: do not log new dentries when logging that a new name exists (bsc#1194649). - btrfs: eliminate some false positives when checking if inode was logged (bsc#1194649). - btrfs: fix race leading to unnecessary transaction commit when logging inode (bsc#1194649). - btrfs: fix race that causes unnecessary logging of ancestor inodes (bsc#1194649). - btrfs: fix race that makes inode logging fallback to transaction commit (bsc#1194649). - btrfs: fix race that results in logging old extents during a fast fsync (bsc#1194649). - btrfs: fixup error handling in fixup_inode_link_counts (bsc#1194649). - btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1194649). - btrfs: Remove unnecessary check from join_running_log_trans (bsc#1194649). - btrfs: remove unnecessary directory inode item update when deleting dir entry (bsc#1194649). - btrfs: remove unnecessary list head initialization when syncing log (bsc#1194649). - btrfs: skip unnecessary searches for xattrs when logging an inode (bsc#1194649). - can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes). - can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes). - can: mcba_usb: properly check endpoint type (git-fixes). - can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes). - cifs: do not skip link targets when an I/O fails (bsc#1194625). - cifs: use the correct max-length for dentry_path_raw() (bsc1196196). - clk: actions: Terminate clk_div_table with sentinel element (git-fixes). - clk: bcm2835: Remove unused variable (git-fixes). - clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes). - clk: imx7d: Remove audio_mclk_root_clk (git-fixes). - clk: Initialize orphan req_rate (git-fixes). - clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes). - clk: nxp: Remove unused variable (git-fixes). - clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes). - clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes). - clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes). - clk: uniphier: Fix fixed-rate initialization (git-fixes). - clocksource: acpi_pm: fix return value of __setup handler (git-fixes). - clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes). - cpufreq: schedutil: Destroy mutex before kobject_put() frees (git-fixes) - crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes). - crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes). - crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes). - crypto: ccree - do not attempt 0 len DMA mappings (git-fixes). - crypto: mxs-dcp - Fix scatterlist processing (git-fixes). - crypto: qat - do not cast parameter in bit operations (git-fixes). - crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes). - crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes). - crypto: rsa-pkcs1pad - restore signature length check (git-fixes). - crypto: vmx - add missing dependencies (git-fixes). - dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501). - driver core: dd: fix return value of __setup handler (git-fixes). - drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes). - drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes). - drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes). - drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes). - drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes). - drm/doc: overview before functions for drm_writeback.c (git-fixes). - drm/i915: Fix dbuf slice config lookup (git-fixes). - drm/i915/gem: add missing boundary check in vm_access (git-fixes). - drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes). - drm/meson: Fix error handling when afbcd.ops->init fails (git-fixes). - drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes). - drm/msm/dpu: add DSPP blocks teardown (git-fixes). - drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes). - drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes). - drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes). - drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes). - drm/vc4: crtc: Make sure the HDMI controller is powered when disabling (git-fixes). - drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes). - Drop HID multitouch fix patch (bsc#1197243), - ecryptfs: fix kernel panic with null dev_name (bsc#1197812). - ecryptfs: Fix typo in message (bsc#1197811). - EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134). - ext2: correct max file size computing (bsc#1197820). - firmware: google: Properly state IOMEM dependency (git-fixes). - firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes). - fscrypt: do not ignore minor_hash when hash is 0 (bsc#1197815). - gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes). - gpio: ts4900: Do not set DAT and OE together (git-fixes). - gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes). - HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243). - hwmon: (pmbus) Add mutex to regulator ops (git-fixes). - hwmon: (pmbus) Add Vin unit off handling (git-fixes). - hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes). - hwrng: atmel - disable trng on failure path (git-fixes). - i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes). - ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259). - iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes). - iio: adc: Add check for devm_request_threaded_irq (git-fixes). - iio: afe: rescale: use s64 for temporary scale calculations (git-fixes). - iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes). - iio: inkern: apply consumer scale when no channel scale is available (git-fixes). - iio: inkern: make a best effort on offset calculation (git-fixes). - Input: aiptek - properly check endpoint type (git-fixes). - iwlwifi: do not advertise TWT support (git-fixes). - kernel-binary.spec: Do not use the default certificate path (bsc#1194943). - KVM: SVM: Do not flush cache if hardware enforces cache coherency across encryption domains (bsc#1178134). - llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes). - mac80211: fix potential double free on mesh join (git-fixes). - mac80211: refuse aggregations sessions before authorized (git-fixes). - media: aspeed: Correct value for h-total-pixels (git-fixes). - media: bttv: fix WARNING regression on tunerless devices (git-fixes). - media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes). - media: davinci: vpif: fix unbalanced runtime PM get (git-fixes). - media: em28xx: initialize refcount before kref_get (git-fixes). - media: hantro: Fix overfill bottom register field name (git-fixes). - media: Revert 'media: em28xx: add missing em28xx_close_extension' (git-fixes). - media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes). - media: usb: go7007: s2250-board: fix leak in probe() (git-fixes). - media: video/hdmi: handle short reads of hdmi info frame (git-fixes). - membarrier: Execute SYNC_CORE on the calling thread (git-fixes) - membarrier: Explicitly sync remote cores when SYNC_CORE is (git-fixes) - memory: emif: Add check for setup_interrupts (git-fixes). - memory: emif: check the pointer temp in get_device_details() (git-fixes). - misc: alcor_pci: Fix an error handling path (git-fixes). - misc: sgi-gru: Do not cast parameter in bit operations (git-fixes). - mm_zone: add function to check if managed dma zone exists (bsc#1197501). - mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501). - mmc: davinci_mmc: Handle error for clk_enable (git-fixes). - mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes). - net: dsa: mv88e6xxx: override existent unicast portvec in port_fdb_add (git-fixes). - net: enetc: initialize the RFS and RSS memories (git-fixes). - net: hns3: add a check for tqp_index in hclge_get_ring_chain_from_mbx() (git-fixes). - net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes). - net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes). - net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes). - net: stmmac: set TxQ mode back to DCB after disabling CBS (git-fixes). - net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018). - net: watchdog: hold device global xmit lock during tx disable (git-fixes). - net/smc: Fix loop in smc_listen (git-fixes). - net/smc: fix using of uninitialized completions (git-fixes). - net/smc: fix wrong list_del in smc_lgr_cleanup_early (git-fixes). - net/smc: Make sure the link_id is unique (git-fixes). - net/smc: Reset conn->lgr when link group registration fails (git-fixes). - netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389). - netxen_nic: fix MSI/MSI-x interrupts (git-fixes). - NFC: port100: fix use-after-free in port100_send_complete (git-fixes). - NFS: Avoid duplicate uncached readdir calls on eof (git-fixes). - NFS: Do not report writeback errors in nfs_getattr() (git-fixes). - NFS: Do not skip directory entries when doing uncached readdir (git-fixes). - NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes). - NFS: Fix initialisation of nfs_client cl_flags field (git-fixes). - NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes). - NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes). - NFS: Use of mapping_set_error() results in spurious errors (git-fixes). - nfsd: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes). - NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes). - NFSv4/pNFS: Fix another issue with a list iterator pointing to the head (git-fixes). - pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes). - pinctrl: mediatek: paris: Fix 'argument' argument type for mtk_pinconf_get() (git-fixes). - pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes). - pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes). - pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes). - pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes). - pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes). - pinctrl: samsung: drop pin banks references on error paths (git-fixes). - pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes). - PM: hibernate: fix __setup handler error handling (git-fixes). - PM: suspend: fix return value of __setup handler (git-fixes). - powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1156395). - powerpc/mm: Fix verification of MMU_FTR_TYPE_44x (bsc#1156395). - powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes). - powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395). - powerpc/perf: Expose Performance Monitor Counter SPR's as part of extended regs (bsc#1198077 ltc#197299). - powerpc/perf: Include PMCs as part of per-cpu cpuhw_events struct (bsc#1198077 ltc#197299). - powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729). - powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729). - powerpc/tm: Fix more userspace r13 corruption (bsc#1065729). - powerpc/xive: fix return value of __setup handler (bsc#1065729). - printk: Add panic_in_progress helper (bsc#1197894). - printk: disable optimistic spin during panic (bsc#1197894). - pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes). - regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes). - remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes). - remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes). - Revert 'build initrd without systemd' (bsc#1197300). - Revert 'Input: clear BTN_RIGHT/MIDDLE on buttonpads' (bsc#1197243). - Revert 'module, async: async_synchronize_full() on module init iff async is used' (bsc#1197888). - Revert 'Revert 'build initrd without systemd' (bsc#1197300)' - Revert 'usb: dwc3: gadget: Use list_replace_init() before traversing lists' (git-fixes). - s390/bpf: Perform r1 range checking before accessing jit->seen_reg (git-fixes). - s390/gmap: do not unconditionally call pte_unmap_unlock() in __gmap_zap() (git-fixes). - s390/gmap: validate VMA in __gmap_zap() (git-fixes). - s390/hypfs: include z/VM guests with access control group set (bsc#1195640 LTC#196352). - s390/kexec_file: fix error handling when applying relocations (git-fixes). - s390/kexec: fix memory leak of ipl report buffer (git-fixes). - s390/kexec: fix return code handling (git-fixes). - s390/mm: fix VMA and page table handling code in storage key handling functions (git-fixes). - s390/mm: validate VMA in PGSTE manipulation functions (git-fixes). - s390/module: fix loading modules with a lot of relocations (git-fixes). - s390/pci_mmio: fully validate the VMA before calling follow_pte() (git-fixes). - s390/tape: fix timer initialization in tape_std_assign() (bsc#1197677 LTC#197378). - scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675). - scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675). - scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675). - scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675). - scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478). - scsi: lpfc: Fix typos in comments (bsc#1197675). - scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478). - scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478). - scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675). - scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675). - scsi: lpfc: Remove failing soft_wwn support (bsc#1197675). - scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675). - scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675). - scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675). - scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675). - scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675). - scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675). - scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675). - scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675). - scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675). - scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675). - scsi: lpfc: Use fc_block_rport() (bsc#1197675). - scsi: lpfc: Use kcalloc() (bsc#1197675). - scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675). - scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675). - scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661). - scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661). - scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661). - scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661). - scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661). - scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661). - scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661). - scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661). - scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661). - scsi: qla2xxx: Fix typos in comments (bsc#1197661). - scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661). - scsi: qla2xxx: Reduce false trigger to login (bsc#1197661). - scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661). - scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661). - scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661). - scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661). - scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661). - serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes). - serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes). - serial: 8250: Fix race condition in RTS-after-send handling (git-fixes). - serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes). - soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes). - soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes). - soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes). - soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes). - spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes). - spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes). - staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes). - staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes). - tcp: add some entropy in __inet_hash_connect() (bsc#1180153). - tcp: change source port randomizarion at connect() time (bsc#1180153). - team: protect features update by RCU to avoid deadlock (git-fixes). - thermal: int340x: Check for NULL after calling kmemdup() (git-fixes). - thermal: int340x: Increase bitmap size (git-fixes). - udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes). - Update config files (bsc#1195926 bsc#1175667). VIRTIO_PCI=m -> VIRTIO_PCI=y - usb: bdc: Adb shows offline after resuming from S2 (git-fixes). - usb: bdc: Fix a resource leak in the error handling path of 'bdc_probe()' (git-fixes). - usb: bdc: Fix unused assignment in bdc_probe() (git-fixes). - usb: bdc: remove duplicated error message (git-fixes). - usb: bdc: Use devm_clk_get_optional() (git-fixes). - usb: bdc: use devm_platform_ioremap_resource() to simplify code (git-fixes). - usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes). - usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes). - usb: dwc2: gadget: Fix kill_all_requests race (git-fixes). - usb: dwc3: gadget: Use list_replace_init() before traversing lists (git-fixes). - usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes). - usb: dwc3: qcom: add IRQ check (git-fixes). - usb: gadget: bdc: use readl_poll_timeout() to simplify code (git-fixes). - usb: gadget: Fix use-after-free bug by not setting udc->dev.driver (git-fixes). - usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes). - usb: host: xen-hcd: add missing unlock in error path (git-fixes). - usb: hub: Fix locking issues with address0_mutex (git-fixes). - usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes). - VFS: filename_create(): fix incorrect intent (bsc#1197534). - video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes). - video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes). - video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes). - video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes). - video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes). - video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes). - video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes). - VMCI: Fix the description of vmci_check_host_caps() (git-fixes). - vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889). - wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes). - wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes). - wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes). - wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes). - x86/cpu: Add hardware-enforced cache coherency as a CPUID feature (bsc#1178134). - x86/mm/pat: Do not flush cache if hardware enforces cache coherency across encryption domnains (bsc#1178134). - x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT (bsc#1178134). - x86/speculation: Warn about Spectre v2 LFENCE mitigation (bsc#1178134). - xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396). - xhci: fix garbage USBSTS being logged in some cases (git-fixes).
Patchnames
SUSE-2022-1163,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1163,openSUSE-SLE-15.3-2022-1163
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for the Linux Kernel",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)\n- CVE-2022-1199: Fixed null-ptr-deref and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198028)\n- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)\n- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).\n- CVE-2022-1195: Fixed an use-after-free vulnerability which could allow a local attacker with a user privilege to execute a denial of service. (bsc#1198029)\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)\n- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)\n- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)\n- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)\n- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)\n- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)\n- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)\n- CVE-2022-27223: Fixed an out-of-array access in /usb/gadget/udc/udc-xilinx.c. (bsc#1197245)\n- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)\n- CVE-2021-45402: Fixed a pointer leak in check_alu_op() of kernel/bpf/verifier.c. (bsc#1196130).\n- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)\n\n\nThe following non-security bugs were fixed:\n\n- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).\n- ACPI: APEI: fix return value of __setup handlers (git-fixes).\n- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).\n- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).\n- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).\n- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).\n- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).\n- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).\n- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).\n- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).\n- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).\n- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).\n- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).\n- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).\n- ALSA: spi: Add check for clk_enable() (git-fixes).\n- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).\n- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).\n- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).\n- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).\n- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).\n- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).\n- ASoC: fsi: Add check for clk_enable (git-fixes).\n- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).\n- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).\n- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).\n- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).\n- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).\n- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).\n- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).\n- ASoC: SOF: topology: remove redundant code (git-fixes).\n- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).\n- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).\n- ASoC: topology: Allow TLV control to be either read or write (git-fixes).\n- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).\n- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).\n- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).\n- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).\n- block: update io_ticks when io hang (bsc#1197817).\n- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).\n- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).\n- bpf: Remove config check to enable bpf support for branch records (git-fixes bsc#1177028).\n- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1194649).\n- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1194649).\n- btrfs: avoid unnecessary logging of xattrs during fast fsyncs (bsc#1194649).\n- btrfs: check error value from btrfs_update_inode in tree log (bsc#1194649).\n- btrfs: check if a log root exists before locking the log_mutex on unlink (bsc#1194649).\n- btrfs: check if a log tree exists at inode_logged() (bsc#1194649).\n- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1194649).\n- btrfs: do not log new dentries when logging that a new name exists (bsc#1194649).\n- btrfs: eliminate some false positives when checking if inode was logged (bsc#1194649).\n- btrfs: fix race leading to unnecessary transaction commit when logging inode (bsc#1194649).\n- btrfs: fix race that causes unnecessary logging of ancestor inodes (bsc#1194649).\n- btrfs: fix race that makes inode logging fallback to transaction commit (bsc#1194649).\n- btrfs: fix race that results in logging old extents during a fast fsync (bsc#1194649).\n- btrfs: fixup error handling in fixup_inode_link_counts (bsc#1194649).\n- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1194649).\n- btrfs: Remove unnecessary check from join_running_log_trans (bsc#1194649).\n- btrfs: remove unnecessary directory inode item update when deleting dir entry (bsc#1194649).\n- btrfs: remove unnecessary list head initialization when syncing log (bsc#1194649).\n- btrfs: skip unnecessary searches for xattrs when logging an inode (bsc#1194649).\n- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).\n- can: mcba_usb: properly check endpoint type (git-fixes).\n- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).\n- cifs: do not skip link targets when an I/O fails (bsc#1194625).\n- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).\n- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: bcm2835: Remove unused variable (git-fixes).\n- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).\n- clk: Initialize orphan req_rate (git-fixes).\n- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: nxp: Remove unused variable (git-fixes).\n- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).\n- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).\n- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).\n- clk: uniphier: Fix fixed-rate initialization (git-fixes).\n- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).\n- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).\n- cpufreq: schedutil: Destroy mutex before kobject_put() frees (git-fixes)\n- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).\n- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).\n- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).\n- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).\n- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).\n- crypto: qat - do not cast parameter in bit operations (git-fixes).\n- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).\n- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).\n- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).\n- crypto: vmx - add missing dependencies (git-fixes).\n- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).\n- driver core: dd: fix return value of __setup handler (git-fixes).\n- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).\n- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).\n- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).\n- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).\n- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).\n- drm/doc: overview before functions for drm_writeback.c (git-fixes).\n- drm/i915: Fix dbuf slice config lookup (git-fixes).\n- drm/i915/gem: add missing boundary check in vm_access (git-fixes).\n- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).\n- drm/meson: Fix error handling when afbcd.ops->init fails (git-fixes).\n- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).\n- drm/msm/dpu: add DSPP blocks teardown (git-fixes).\n- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).\n- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).\n- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).\n- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).\n- drm/vc4: crtc: Make sure the HDMI controller is powered when disabling (git-fixes).\n- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).\n- Drop HID multitouch fix patch (bsc#1197243),\n- ecryptfs: fix kernel panic with null dev_name (bsc#1197812).\n- ecryptfs: Fix typo in message (bsc#1197811).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1178134).\n- ext2: correct max file size computing (bsc#1197820).\n- firmware: google: Properly state IOMEM dependency (git-fixes).\n- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).\n- fscrypt: do not ignore minor_hash when hash is 0 (bsc#1197815).\n- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).\n- gpio: ts4900: Do not set DAT and OE together (git-fixes).\n- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).\n- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).\n- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).\n- hwmon: (pmbus) Add Vin unit off handling (git-fixes).\n- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).\n- hwrng: atmel - disable trng on failure path (git-fixes).\n- i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes).\n- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).\n- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).\n- iio: adc: Add check for devm_request_threaded_irq (git-fixes).\n- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).\n- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).\n- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).\n- iio: inkern: make a best effort on offset calculation (git-fixes).\n- Input: aiptek - properly check endpoint type (git-fixes).\n- iwlwifi: do not advertise TWT support (git-fixes).\n- kernel-binary.spec: Do not use the default certificate path (bsc#1194943).\n- KVM: SVM: Do not flush cache if hardware enforces cache coherency across encryption domains (bsc#1178134).\n- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).\n- mac80211: fix potential double free on mesh join (git-fixes).\n- mac80211: refuse aggregations sessions before authorized (git-fixes).\n- media: aspeed: Correct value for h-total-pixels (git-fixes).\n- media: bttv: fix WARNING regression on tunerless devices (git-fixes).\n- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).\n- media: em28xx: initialize refcount before kref_get (git-fixes).\n- media: hantro: Fix overfill bottom register field name (git-fixes).\n- media: Revert 'media: em28xx: add missing em28xx_close_extension' (git-fixes).\n- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).\n- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).\n- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).\n- membarrier: Execute SYNC_CORE on the calling thread (git-fixes)\n- membarrier: Explicitly sync remote cores when SYNC_CORE is (git-fixes)\n- memory: emif: Add check for setup_interrupts (git-fixes).\n- memory: emif: check the pointer temp in get_device_details() (git-fixes).\n- misc: alcor_pci: Fix an error handling path (git-fixes).\n- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).\n- mm_zone: add function to check if managed dma zone exists (bsc#1197501).\n- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).\n- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).\n- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).\n- net: dsa: mv88e6xxx: override existent unicast portvec in port_fdb_add (git-fixes).\n- net: enetc: initialize the RFS and RSS memories (git-fixes).\n- net: hns3: add a check for tqp_index in hclge_get_ring_chain_from_mbx() (git-fixes).\n- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).\n- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).\n- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).\n- net: stmmac: set TxQ mode back to DCB after disabling CBS (git-fixes).\n- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).\n- net: watchdog: hold device global xmit lock during tx disable (git-fixes).\n- net/smc: Fix loop in smc_listen (git-fixes).\n- net/smc: fix using of uninitialized completions (git-fixes).\n- net/smc: fix wrong list_del in smc_lgr_cleanup_early (git-fixes).\n- net/smc: Make sure the link_id is unique (git-fixes).\n- net/smc: Reset conn->lgr when link group registration fails (git-fixes).\n- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).\n- netxen_nic: fix MSI/MSI-x interrupts (git-fixes).\n- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).\n- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).\n- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).\n- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).\n- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).\n- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).\n- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).\n- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).\n- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).\n- nfsd: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).\n- NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).\n- NFSv4/pNFS: Fix another issue with a list iterator pointing to the head (git-fixes).\n- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).\n- pinctrl: mediatek: paris: Fix 'argument' argument type for mtk_pinconf_get() (git-fixes).\n- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).\n- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).\n- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).\n- pinctrl: samsung: drop pin banks references on error paths (git-fixes).\n- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).\n- PM: hibernate: fix __setup handler error handling (git-fixes).\n- PM: suspend: fix return value of __setup handler (git-fixes).\n- powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1156395).\n- powerpc/mm: Fix verification of MMU_FTR_TYPE_44x (bsc#1156395).\n- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).\n- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).\n- powerpc/perf: Expose Performance Monitor Counter SPR's as part of extended regs (bsc#1198077 ltc#197299).\n- powerpc/perf: Include PMCs as part of per-cpu cpuhw_events struct (bsc#1198077 ltc#197299).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/xive: fix return value of __setup handler (bsc#1065729).\n- printk: Add panic_in_progress helper (bsc#1197894).\n- printk: disable optimistic spin during panic (bsc#1197894).\n- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).\n- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).\n- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).\n- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).\n- Revert 'build initrd without systemd' (bsc#1197300).\n- Revert 'Input: clear BTN_RIGHT/MIDDLE on buttonpads' (bsc#1197243).\n- Revert 'module, async: async_synchronize_full() on module init iff async is used' (bsc#1197888).\n- Revert 'Revert 'build initrd without systemd' (bsc#1197300)'\n- Revert 'usb: dwc3: gadget: Use list_replace_init() before traversing lists' (git-fixes).\n- s390/bpf: Perform r1 range checking before accessing jit->seen_reg (git-fixes).\n- s390/gmap: do not unconditionally call pte_unmap_unlock() in __gmap_zap() (git-fixes).\n- s390/gmap: validate VMA in __gmap_zap() (git-fixes).\n- s390/hypfs: include z/VM guests with access control group set (bsc#1195640 LTC#196352).\n- s390/kexec_file: fix error handling when applying relocations (git-fixes).\n- s390/kexec: fix memory leak of ipl report buffer (git-fixes).\n- s390/kexec: fix return code handling (git-fixes).\n- s390/mm: fix VMA and page table handling code in storage key handling functions (git-fixes).\n- s390/mm: validate VMA in PGSTE manipulation functions (git-fixes).\n- s390/module: fix loading modules with a lot of relocations (git-fixes).\n- s390/pci_mmio: fully validate the VMA before calling follow_pte() (git-fixes).\n- s390/tape: fix timer initialization in tape_std_assign() (bsc#1197677 LTC#197378).\n- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).\n- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).\n- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).\n- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).\n- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Fix typos in comments (bsc#1197675).\n- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).\n- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).\n- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).\n- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).\n- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).\n- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).\n- scsi: lpfc: Use fc_block_rport() (bsc#1197675).\n- scsi: lpfc: Use kcalloc() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).\n- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).\n- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).\n- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).\n- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).\n- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).\n- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).\n- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).\n- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).\n- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).\n- scsi: qla2xxx: Fix typos in comments (bsc#1197661).\n- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).\n- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).\n- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).\n- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).\n- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).\n- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).\n- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).\n- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).\n- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).\n- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).\n- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).\n- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).\n- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).\n- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).\n- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).\n- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).\n- tcp: change source port randomizarion at connect() time (bsc#1180153).\n- team: protect features update by RCU to avoid deadlock (git-fixes).\n- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).\n- thermal: int340x: Increase bitmap size (git-fixes).\n- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).\n- Update config files (bsc#1195926 bsc#1175667). VIRTIO_PCI=m -> VIRTIO_PCI=y\n- usb: bdc: Adb shows offline after resuming from S2 (git-fixes).\n- usb: bdc: Fix a resource leak in the error handling path of 'bdc_probe()' (git-fixes).\n- usb: bdc: Fix unused assignment in bdc_probe() (git-fixes).\n- usb: bdc: remove duplicated error message (git-fixes).\n- usb: bdc: Use devm_clk_get_optional() (git-fixes).\n- usb: bdc: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).\n- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).\n- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).\n- usb: dwc3: gadget: Use list_replace_init() before traversing lists (git-fixes).\n- usb: dwc3: meson-g12a: Disable the regulator in the error handling path of the probe (git-fixes).\n- usb: dwc3: qcom: add IRQ check (git-fixes).\n- usb: gadget: bdc: use readl_poll_timeout() to simplify code (git-fixes).\n- usb: gadget: Fix use-after-free bug by not setting udc->dev.driver (git-fixes).\n- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).\n- usb: host: xen-hcd: add missing unlock in error path (git-fixes).\n- usb: hub: Fix locking issues with address0_mutex (git-fixes).\n- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).\n- VFS: filename_create(): fix incorrect intent (bsc#1197534).\n- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).\n- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).\n- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).\n- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).\n- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).\n- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).\n- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).\n- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).\n- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).\n- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).\n- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).\n- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).\n- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).\n- x86/cpu: Add hardware-enforced cache coherency as a CPUID feature (bsc#1178134).\n- x86/mm/pat: Do not flush cache if hardware enforces cache coherency across encryption domnains (bsc#1178134).\n- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT (bsc#1178134).\n- x86/speculation: Warn about Spectre v2 LFENCE mitigation (bsc#1178134).\n- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).\n- xhci: fix garbage USBSTS being logged in some cases (git-fixes).\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "SUSE-2022-1163,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1163,openSUSE-SLE-15.3-2022-1163",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1163-1.json",
         },
         {
            category: "self",
            summary: "URL for SUSE-SU-2022:1163-1",
            url: "https://www.suse.com/support/update/announcement/2022/suse-su-20221163-1/",
         },
         {
            category: "self",
            summary: "E-Mail link for SUSE-SU-2022:1163-1",
            url: "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html",
         },
         {
            category: "self",
            summary: "SUSE Bug 1065729",
            url: "https://bugzilla.suse.com/1065729",
         },
         {
            category: "self",
            summary: "SUSE Bug 1156395",
            url: "https://bugzilla.suse.com/1156395",
         },
         {
            category: "self",
            summary: "SUSE Bug 1175667",
            url: "https://bugzilla.suse.com/1175667",
         },
         {
            category: "self",
            summary: "SUSE Bug 1177028",
            url: "https://bugzilla.suse.com/1177028",
         },
         {
            category: "self",
            summary: "SUSE Bug 1178134",
            url: "https://bugzilla.suse.com/1178134",
         },
         {
            category: "self",
            summary: "SUSE Bug 1179639",
            url: "https://bugzilla.suse.com/1179639",
         },
         {
            category: "self",
            summary: "SUSE Bug 1180153",
            url: "https://bugzilla.suse.com/1180153",
         },
         {
            category: "self",
            summary: "SUSE Bug 1189562",
            url: "https://bugzilla.suse.com/1189562",
         },
         {
            category: "self",
            summary: "SUSE Bug 1194589",
            url: "https://bugzilla.suse.com/1194589",
         },
         {
            category: "self",
            summary: "SUSE Bug 1194625",
            url: "https://bugzilla.suse.com/1194625",
         },
         {
            category: "self",
            summary: "SUSE Bug 1194649",
            url: "https://bugzilla.suse.com/1194649",
         },
         {
            category: "self",
            summary: "SUSE Bug 1194943",
            url: "https://bugzilla.suse.com/1194943",
         },
         {
            category: "self",
            summary: "SUSE Bug 1195051",
            url: "https://bugzilla.suse.com/1195051",
         },
         {
            category: "self",
            summary: "SUSE Bug 1195353",
            url: "https://bugzilla.suse.com/1195353",
         },
         {
            category: "self",
            summary: "SUSE Bug 1195640",
            url: "https://bugzilla.suse.com/1195640",
         },
         {
            category: "self",
            summary: "SUSE Bug 1195926",
            url: "https://bugzilla.suse.com/1195926",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196018",
            url: "https://bugzilla.suse.com/1196018",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196130",
            url: "https://bugzilla.suse.com/1196130",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196196",
            url: "https://bugzilla.suse.com/1196196",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196478",
            url: "https://bugzilla.suse.com/1196478",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196488",
            url: "https://bugzilla.suse.com/1196488",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196761",
            url: "https://bugzilla.suse.com/1196761",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196823",
            url: "https://bugzilla.suse.com/1196823",
         },
         {
            category: "self",
            summary: "SUSE Bug 1196956",
            url: "https://bugzilla.suse.com/1196956",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197227",
            url: "https://bugzilla.suse.com/1197227",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197243",
            url: "https://bugzilla.suse.com/1197243",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197245",
            url: "https://bugzilla.suse.com/1197245",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197300",
            url: "https://bugzilla.suse.com/1197300",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197302",
            url: "https://bugzilla.suse.com/1197302",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197331",
            url: "https://bugzilla.suse.com/1197331",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197343",
            url: "https://bugzilla.suse.com/1197343",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197366",
            url: "https://bugzilla.suse.com/1197366",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197389",
            url: "https://bugzilla.suse.com/1197389",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197460",
            url: "https://bugzilla.suse.com/1197460",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197462",
            url: "https://bugzilla.suse.com/1197462",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197501",
            url: "https://bugzilla.suse.com/1197501",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197534",
            url: "https://bugzilla.suse.com/1197534",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197661",
            url: "https://bugzilla.suse.com/1197661",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197675",
            url: "https://bugzilla.suse.com/1197675",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197677",
            url: "https://bugzilla.suse.com/1197677",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197702",
            url: "https://bugzilla.suse.com/1197702",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197811",
            url: "https://bugzilla.suse.com/1197811",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197812",
            url: "https://bugzilla.suse.com/1197812",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197815",
            url: "https://bugzilla.suse.com/1197815",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197817",
            url: "https://bugzilla.suse.com/1197817",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197819",
            url: "https://bugzilla.suse.com/1197819",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197820",
            url: "https://bugzilla.suse.com/1197820",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197888",
            url: "https://bugzilla.suse.com/1197888",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197889",
            url: "https://bugzilla.suse.com/1197889",
         },
         {
            category: "self",
            summary: "SUSE Bug 1197894",
            url: "https://bugzilla.suse.com/1197894",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198027",
            url: "https://bugzilla.suse.com/1198027",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198028",
            url: "https://bugzilla.suse.com/1198028",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198029",
            url: "https://bugzilla.suse.com/1198029",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198030",
            url: "https://bugzilla.suse.com/1198030",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198031",
            url: "https://bugzilla.suse.com/1198031",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198032",
            url: "https://bugzilla.suse.com/1198032",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198033",
            url: "https://bugzilla.suse.com/1198033",
         },
         {
            category: "self",
            summary: "SUSE Bug 1198077",
            url: "https://bugzilla.suse.com/1198077",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-39698 page",
            url: "https://www.suse.com/security/cve/CVE-2021-39698/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-45402 page",
            url: "https://www.suse.com/security/cve/CVE-2021-45402/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-45868 page",
            url: "https://www.suse.com/security/cve/CVE-2021-45868/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-0850 page",
            url: "https://www.suse.com/security/cve/CVE-2022-0850/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-0854 page",
            url: "https://www.suse.com/security/cve/CVE-2022-0854/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1011 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1011/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1016 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1016/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1048 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1048/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1055 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1055/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1195 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1195/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1198 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1198/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1199 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1199/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-1205 page",
            url: "https://www.suse.com/security/cve/CVE-2022-1205/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-23036 page",
            url: "https://www.suse.com/security/cve/CVE-2022-23036/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-23037 page",
            url: "https://www.suse.com/security/cve/CVE-2022-23037/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-23038 page",
            url: "https://www.suse.com/security/cve/CVE-2022-23038/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-23039 page",
            url: "https://www.suse.com/security/cve/CVE-2022-23039/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-23040 page",
            url: "https://www.suse.com/security/cve/CVE-2022-23040/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-23041 page",
            url: "https://www.suse.com/security/cve/CVE-2022-23041/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-23042 page",
            url: "https://www.suse.com/security/cve/CVE-2022-23042/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-27223 page",
            url: "https://www.suse.com/security/cve/CVE-2022-27223/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-27666 page",
            url: "https://www.suse.com/security/cve/CVE-2022-27666/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-28388 page",
            url: "https://www.suse.com/security/cve/CVE-2022-28388/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-28389 page",
            url: "https://www.suse.com/security/cve/CVE-2022-28389/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2022-28390 page",
            url: "https://www.suse.com/security/cve/CVE-2022-28390/",
         },
      ],
      title: "Security update for the Linux Kernel",
      tracking: {
         current_release_date: "2022-04-12T12:59:54Z",
         generator: {
            date: "2022-04-12T12:59:54Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "SUSE-SU-2022:1163-1",
         initial_release_date: "2022-04-12T12:59:54Z",
         revision_history: [
            {
               date: "2022-04-12T12:59:54Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                        product: {
                           name: "kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                           product_id: "kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                        product: {
                           name: "kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                           product_id: "kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "noarch",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                           product_id: "cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                           product_id: "dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                           product_id: "gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "kernel-azure-5.3.18-150300.38.53.1.x86_64",
                           product_id: "kernel-azure-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                           product_id: "kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                           product_id: "kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                           product_id: "kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                           product_id: "kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                           product_id: "kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                           product_id: "kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                           product_id: "ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                     {
                        category: "product_version",
                        name: "reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        product: {
                           name: "reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                           product_id: "reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                        product: {
                           name: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                           product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                           product_identification_helper: {
                              cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp3",
                           },
                        },
                     },
                     {
                        category: "product_name",
                        name: "openSUSE Leap 15.3",
                        product: {
                           name: "openSUSE Leap 15.3",
                           product_id: "openSUSE Leap 15.3",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:leap:15.3",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-5.3.18-150300.38.53.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kernel-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-devel-5.3.18-150300.38.53.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-azure-5.3.18-150300.38.53.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
            },
            product_reference: "kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-azure-5.3.18-150300.38.53.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
            },
            product_reference: "kernel-source-azure-5.3.18-150300.38.53.1.noarch",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-syms-azure-5.3.18-150300.38.53.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
               product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kernel-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-devel-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-extra-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-azure-optional-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-devel-azure-5.3.18-150300.38.53.1.noarch as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
            },
            product_reference: "kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-source-azure-5.3.18-150300.38.53.1.noarch as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
            },
            product_reference: "kernel-source-azure-5.3.18-150300.38.53.1.noarch",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kernel-syms-azure-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64 as component of openSUSE Leap 15.3",
               product_id: "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            },
            product_reference: "reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.3",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2021-39698",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-39698",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-39698",
               url: "https://www.suse.com/security/cve/CVE-2021-39698",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196956 for CVE-2021-39698",
               url: "https://bugzilla.suse.com/1196956",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196959 for CVE-2021-39698",
               url: "https://bugzilla.suse.com/1196959",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209225 for CVE-2021-39698",
               url: "https://bugzilla.suse.com/1209225",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2021-39698",
      },
      {
         cve: "CVE-2021-45402",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-45402",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-45402",
               url: "https://www.suse.com/security/cve/CVE-2021-45402",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196130 for CVE-2021-45402",
               url: "https://bugzilla.suse.com/1196130",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-45402",
      },
      {
         cve: "CVE-2021-45868",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-45868",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-45868",
               url: "https://www.suse.com/security/cve/CVE-2021-45868",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197366 for CVE-2021-45868",
               url: "https://bugzilla.suse.com/1197366",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-45868",
      },
      {
         cve: "CVE-2022-0850",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-0850",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-0850",
               url: "https://www.suse.com/security/cve/CVE-2022-0850",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196761 for CVE-2022-0850",
               url: "https://bugzilla.suse.com/1196761",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-0850",
      },
      {
         cve: "CVE-2022-0854",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-0854",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A memory leak flaw was found in the Linux kernel's DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-0854",
               url: "https://www.suse.com/security/cve/CVE-2022-0854",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196823 for CVE-2022-0854",
               url: "https://bugzilla.suse.com/1196823",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-0854",
      },
      {
         cve: "CVE-2022-1011",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1011",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free flaw was found in the Linux kernel's FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1011",
               url: "https://www.suse.com/security/cve/CVE-2022-1011",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197343 for CVE-2022-1011",
               url: "https://bugzilla.suse.com/1197343",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197344 for CVE-2022-1011",
               url: "https://bugzilla.suse.com/1197344",
            },
            {
               category: "external",
               summary: "SUSE Bug 1198687 for CVE-2022-1011",
               url: "https://bugzilla.suse.com/1198687",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-1011",
               url: "https://bugzilla.suse.com/1204132",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212322 for CVE-2022-1011",
               url: "https://bugzilla.suse.com/1212322",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-1011",
      },
      {
         cve: "CVE-2022-1016",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1016",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1016",
               url: "https://www.suse.com/security/cve/CVE-2022-1016",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197335 for CVE-2022-1016",
               url: "https://bugzilla.suse.com/1197335",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-1016",
      },
      {
         cve: "CVE-2022-1048",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1048",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free flaw was found in the Linux kernel's sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1048",
               url: "https://www.suse.com/security/cve/CVE-2022-1048",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197331 for CVE-2022-1048",
               url: "https://bugzilla.suse.com/1197331",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197597 for CVE-2022-1048",
               url: "https://bugzilla.suse.com/1197597",
            },
            {
               category: "external",
               summary: "SUSE Bug 1200041 for CVE-2022-1048",
               url: "https://bugzilla.suse.com/1200041",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-1048",
               url: "https://bugzilla.suse.com/1204132",
            },
            {
               category: "external",
               summary: "SUSE Bug 1212325 for CVE-2022-1048",
               url: "https://bugzilla.suse.com/1212325",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-1048",
      },
      {
         cve: "CVE-2022-1055",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1055",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1055",
               url: "https://www.suse.com/security/cve/CVE-2022-1055",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197702 for CVE-2022-1055",
               url: "https://bugzilla.suse.com/1197702",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197705 for CVE-2022-1055",
               url: "https://bugzilla.suse.com/1197705",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-1055",
      },
      {
         cve: "CVE-2022-1195",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1195",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1195",
               url: "https://www.suse.com/security/cve/CVE-2022-1195",
            },
            {
               category: "external",
               summary: "SUSE Bug 1198029 for CVE-2022-1195",
               url: "https://bugzilla.suse.com/1198029",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-1195",
      },
      {
         cve: "CVE-2022-1198",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1198",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1198",
               url: "https://www.suse.com/security/cve/CVE-2022-1198",
            },
            {
               category: "external",
               summary: "SUSE Bug 1198030 for CVE-2022-1198",
               url: "https://bugzilla.suse.com/1198030",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-1198",
      },
      {
         cve: "CVE-2022-1199",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1199",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1199",
               url: "https://www.suse.com/security/cve/CVE-2022-1199",
            },
            {
               category: "external",
               summary: "SUSE Bug 1198028 for CVE-2022-1199",
               url: "https://bugzilla.suse.com/1198028",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-1199",
      },
      {
         cve: "CVE-2022-1205",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-1205",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A NULL pointer dereference flaw was found in the Linux kernel's Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-1205",
               url: "https://www.suse.com/security/cve/CVE-2022-1205",
            },
            {
               category: "external",
               summary: "SUSE Bug 1198027 for CVE-2022-1205",
               url: "https://bugzilla.suse.com/1198027",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-1205",
      },
      {
         cve: "CVE-2022-23036",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-23036",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-23036",
               url: "https://www.suse.com/security/cve/CVE-2022-23036",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196488 for CVE-2022-23036",
               url: "https://bugzilla.suse.com/1196488",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199099 for CVE-2022-23036",
               url: "https://bugzilla.suse.com/1199099",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199141 for CVE-2022-23036",
               url: "https://bugzilla.suse.com/1199141",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-23036",
               url: "https://bugzilla.suse.com/1204132",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-23036",
      },
      {
         cve: "CVE-2022-23037",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-23037",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-23037",
               url: "https://www.suse.com/security/cve/CVE-2022-23037",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199099 for CVE-2022-23037",
               url: "https://bugzilla.suse.com/1199099",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199141 for CVE-2022-23037",
               url: "https://bugzilla.suse.com/1199141",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-23037",
               url: "https://bugzilla.suse.com/1204132",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-23037",
      },
      {
         cve: "CVE-2022-23038",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-23038",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-23038",
               url: "https://www.suse.com/security/cve/CVE-2022-23038",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199099 for CVE-2022-23038",
               url: "https://bugzilla.suse.com/1199099",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199141 for CVE-2022-23038",
               url: "https://bugzilla.suse.com/1199141",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-23038",
               url: "https://bugzilla.suse.com/1204132",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-23038",
      },
      {
         cve: "CVE-2022-23039",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-23039",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-23039",
               url: "https://www.suse.com/security/cve/CVE-2022-23039",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199099 for CVE-2022-23039",
               url: "https://bugzilla.suse.com/1199099",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199141 for CVE-2022-23039",
               url: "https://bugzilla.suse.com/1199141",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-23039",
               url: "https://bugzilla.suse.com/1204132",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-23039",
      },
      {
         cve: "CVE-2022-23040",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-23040",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-23040",
               url: "https://www.suse.com/security/cve/CVE-2022-23040",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199099 for CVE-2022-23040",
               url: "https://bugzilla.suse.com/1199099",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199141 for CVE-2022-23040",
               url: "https://bugzilla.suse.com/1199141",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-23040",
               url: "https://bugzilla.suse.com/1204132",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-23040",
      },
      {
         cve: "CVE-2022-23041",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-23041",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-23041",
               url: "https://www.suse.com/security/cve/CVE-2022-23041",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199099 for CVE-2022-23041",
               url: "https://bugzilla.suse.com/1199099",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199141 for CVE-2022-23041",
               url: "https://bugzilla.suse.com/1199141",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-23041",
               url: "https://bugzilla.suse.com/1204132",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-23041",
      },
      {
         cve: "CVE-2022-23042",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-23042",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-23042",
               url: "https://www.suse.com/security/cve/CVE-2022-23042",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199099 for CVE-2022-23042",
               url: "https://bugzilla.suse.com/1199099",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199141 for CVE-2022-23042",
               url: "https://bugzilla.suse.com/1199141",
            },
            {
               category: "external",
               summary: "SUSE Bug 1204132 for CVE-2022-23042",
               url: "https://bugzilla.suse.com/1204132",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-23042",
      },
      {
         cve: "CVE-2022-27223",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-27223",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-27223",
               url: "https://www.suse.com/security/cve/CVE-2022-27223",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197245 for CVE-2022-27223",
               url: "https://bugzilla.suse.com/1197245",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-27223",
      },
      {
         cve: "CVE-2022-27666",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-27666",
            },
         ],
         notes: [
            {
               category: "general",
               text: "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-27666",
               url: "https://www.suse.com/security/cve/CVE-2022-27666",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197131 for CVE-2022-27666",
               url: "https://bugzilla.suse.com/1197131",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197133 for CVE-2022-27666",
               url: "https://bugzilla.suse.com/1197133",
            },
            {
               category: "external",
               summary: "SUSE Bug 1197462 for CVE-2022-27666",
               url: "https://bugzilla.suse.com/1197462",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "important",
            },
         ],
         title: "CVE-2022-27666",
      },
      {
         cve: "CVE-2022-28388",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-28388",
            },
         ],
         notes: [
            {
               category: "general",
               text: "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-28388",
               url: "https://www.suse.com/security/cve/CVE-2022-28388",
            },
            {
               category: "external",
               summary: "SUSE Bug 1198032 for CVE-2022-28388",
               url: "https://bugzilla.suse.com/1198032",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-28388",
      },
      {
         cve: "CVE-2022-28389",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-28389",
            },
         ],
         notes: [
            {
               category: "general",
               text: "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-28389",
               url: "https://www.suse.com/security/cve/CVE-2022-28389",
            },
            {
               category: "external",
               summary: "SUSE Bug 1198033 for CVE-2022-28389",
               url: "https://bugzilla.suse.com/1198033",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201657 for CVE-2022-28389",
               url: "https://bugzilla.suse.com/1201657",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-28389",
      },
      {
         cve: "CVE-2022-28390",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2022-28390",
            },
         ],
         notes: [
            {
               category: "general",
               text: "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
               "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2022-28390",
               url: "https://www.suse.com/security/cve/CVE-2022-28390",
            },
            {
               category: "external",
               summary: "SUSE Bug 1198031 for CVE-2022-28390",
               url: "https://bugzilla.suse.com/1198031",
            },
            {
               category: "external",
               summary: "SUSE Bug 1201517 for CVE-2022-28390",
               url: "https://bugzilla.suse.com/1201517",
            },
            {
               category: "external",
               summary: "SUSE Bug 1207969 for CVE-2022-28390",
               url: "https://bugzilla.suse.com/1207969",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.53.1.noarch",
                  "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.53.1.x86_64",
                  "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.53.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2022-04-12T12:59:54Z",
               details: "moderate",
            },
         ],
         title: "CVE-2022-28390",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.