SUSE-SU-2022:1676-1

Vulnerability from csaf_suse - Published: 2022-05-16 08:13 - Updated: 2022-05-16 08:13
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2020-27835: Fixed a use after free vulnerability in infiniband hfi1 driver in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878). - CVE-2021-0707: Fixed a use after free vulnerability in dma_buf_release of dma-buf.c, which may lead to local escalation of privilege with no additional execution privileges needed (bnc#1198437). - CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723). - CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647). - CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055). - CVE-2021-4154: Fixed a use-after-free vulnerability in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c, allowing a local privilege escalation by an attacker with user privileges by exploiting the fsconfig syscall parameter, leading to a container breakout and a denial of service on the system (bnc#1193842). - CVE-2022-0812: Fixed information leak when a file is read from RDMA (bsc#1196639) - CVE-2022-1158: Fixed a vulnerability in the kvm module that may lead to a use-after-free write or denial of service (bsc#1197660). - CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914). - CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516). - CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742). - CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012). - CVE-2022-28356: Fixed a refcount leak bug in net/llc/af_llc.c (bnc#1197391). - CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018). - CVE-2022-28893: Fixed a use after free vulnerability in inet_put_port where some sockets are not closed before xs_xprt_free() (bsc#1198330). - CVE-2022-29156: Fixed a double free vulnerability related to rtrs_clt_dev_release.ate (jsc#SLE-15176 bsc#1198515). The following non-security bugs were fixed: - ACPI/APEI: Limit printable size of BERT table data (git-fixes). - ACPI: processor idle: Check for architectural support for LPI (git-fixes). - ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes). - ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes). - ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes). - ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes). - ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes). - ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes). - ALSA: pcm: Test for 'silence' field in struct 'pcm_format_data' (git-fixes). - ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes). - ALSA: usb-audio: Increase max buffer size (git-fixes). - ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes). - ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes). - ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes). - ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes). - ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes). - ASoC: soc-compress: Change the check for codec_dai (git-fixes). - ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes). - ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes). - ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes). - Bluetooth: Fix use after free in hci_send_acl (git-fixes). - Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes). - Bluetooth: hci_serdev: call init_rwsem() before p->open() (git-fixes). - Documentation: add link to stable release candidate tree (git-fixes). - HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes). - IB/hfi1: Allow larger MTU without AIP (jsc#SLE-13208). - Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes). - KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes). - NFSv4: fix open failure with O_ACCMODE flag (git-fixes). - PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes). - PCI: aardvark: Fix support for MSI interrupts (git-fixes). - PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes). - PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes). - PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes). - PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes). - RDMA/core: Set MR type in ib_reg_user_mr (jsc#SLE-8449). - RDMA/mlx5: Add a missing update of cache->last_add (jsc#SLE-15175). - RDMA/mlx5: Do not remove cache MRs when a delay is needed (jsc#SLE-15175). - RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (jsc#SLE-15175). - SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() (git-fixes). - SUNRPC: Fix the svc_deferred_event trace class (git-fixes). - SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes). - SUNRPC: Handle low memory situations in call_status() (git-fixes). - SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367). - USB: serial: pl2303: add IBM device IDs (git-fixes). - USB: serial: simple: add Nokia phone driver (git-fixes). - USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes). - USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes). - USB: dwc3: omap: fix 'unbalanced disables for smps10_out1' on omap5evm (git-fixes). - USB: gadget: uvc: Fix crash when encoding data for usb request (git-fixes). - adm8211: fix error return code in adm8211_probe() (git-fixes). - arm64/sve: Use correct size when reinitialising SVE state (git-fixes) - arm64: clear_page() shouldn't use DC ZVA when DCZID_EL0.DZP == 1 (git-fixes) - arm64: dts: allwinner: h5: NanoPI Neo 2: Fix ethernet node (git-fixes) - arm64: dts: allwinner: orangepi-zero-plus: fix PHY mode (git-fixes) - arm64: dts: exynos: correct GIC CPU interfaces address range on (git-fixes) - arm64: dts: ls1028a: fix memory node (git-fixes) - arm64: dts: ls1028a: fix node name for the sysclk (git-fixes) - arm64: dts: lx2160a: fix scl-gpios property name (git-fixes) - arm64: dts: marvell: armada-37xx: Extend PCIe MEM space (git-fixes) - arm64: dts: marvell: armada-37xx: Fix reg for standard variant of (git-fixes) - arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes) - arm64: dts: rockchip: Fix GPU register width for RK3328 (git-fixes) - arm64: dts: rockchip: remove mmc-hs400-enhanced-strobe from (git-fixes) - arm64: dts: zii-ultra: fix 12V_MAIN voltage (git-fixes) - arm64: head: avoid over-mapping in map_memory (git-fixes) - ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes). - ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes). - ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes). - ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes). - ath5k: fix building with LEDS=m (git-fixes). - ath9k: Fix usage of driver-private space in tx_info (git-fixes). - ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes). - ath9k_htc: fix uninit value bugs (git-fixes). - bareudp: use ipv6_mod_enabled to check if IPv6 enabled (jsc#SLE-15172). - bfq: Avoid merging queues with different parents (bsc#1197926). - bfq: Drop pointless unlock-lock pair (bsc#1197926). - bfq: Get rid of __bio_blkcg() usage (bsc#1197926). - bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926). - bfq: Remove pointless bfq_init_rq() calls (bsc#1197926). - bfq: Split shared queues on move between cgroups (bsc#1197926). - bfq: Track whether bfq_group is still online (bsc#1197926). - bfq: Update cgroup information before merging bio (bsc#1197926). - block: Drop leftover references to RQF_SORTED (bsc#1182073). - bnx2x: fix napi API usage sequence (bsc#1198217). - bpf: Resolve to prog->aux->dst_prog->type only for BPF_PROG_TYPE_EXT (git-fixes bsc#1177028). - brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes). - brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes). - brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes). - brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes). - carl9170: fix missing bit-wise or operator for tx_params (git-fixes). - cfg80211: hold bss_lock while updating nontrans_list (git-fixes). - cifs: fix bad fids sent over wire (bsc#1197157). - clk: Enforce that disjoints limits are invalid (git-fixes). - clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes). - direct-io: clean up error paths of do_blockdev_direct_IO (bsc#1197656). - direct-io: defer alignment check until after the EOF check (bsc#1197656). - direct-io: do not force writeback for reads beyond EOF (bsc#1197656). - dma-debug: fix return value of __setup handlers (git-fixes). - dma: at_xdmac: fix a missing check on list iterator (git-fixes). - dmaengine: Revert 'dmaengine: shdma: Fix runtime PM imbalance on error' (git-fixes). - dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes). - dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes). - dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes). - dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes). - drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes). - drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes). - drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes). - drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes). - drm/amd: Add USBC connector ID (git-fixes). - drm/amdgpu: Fix recursive locking warning (git-fixes). - drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes). - drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes). - drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes). - drm/amdkfd: make CRAT table missing message informational only (git-fixes). - drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes). - drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes). - drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes). - drm/edid: Do not clear formats if using deep color (git-fixes). - drm/edid: check basic audio support on CEA extension block (git-fixes). - drm/i915/gem: Flush coherency domains on first set-domain-ioctl (git-fixes). - drm/i915: Call i915_globals_exit() if pci_register_device() fails (git-fixes). - drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes). - drm/mediatek: Add AAL output size configuration (git-fixes). - drm/mediatek: Fix aal size config (git-fixes). - drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes). - drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes). - drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes). - drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes). - drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes). - drm: Add orientation quirk for GPD Win Max (git-fixes). - drm: add a locked version of drm_is_current_master (bsc#1197914). - drm: add a locked version of drm_is_current_master (bsc#1197914). - drm: drm_file struct kABI compatibility workaround (bsc#1197914). - drm: drm_file struct kABI compatibility workaround (bsc#1197914). - drm: protect drm_master pointers in drm_lease.c (bsc#1197914). - drm: protect drm_master pointers in drm_lease.c (bsc#1197914). - drm: serialize drm_file.master with a new spinlock (bsc#1197914). - drm: serialize drm_file.master with a new spinlock (bsc#1197914). - drm: use the lookup lock in drm_is_current_master (bsc#1197914). - drm: use the lookup lock in drm_is_current_master (bsc#1197914). - e1000e: Fix possible overflow in LTR decoding (git-fixes). - fibmap: Reject negative block numbers (bsc#1198448). - fibmap: Use bmap instead of ->bmap method in ioctl_fibmap (bsc#1198448). - firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes). - gpiolib: acpi: use correct format characters (git-fixes). - gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes). - hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes). - i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes). - ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes). - ipmi: Move remove_work to dedicated workqueue (git-fixes). - ipmi: bail out if init_srcu_struct fails (git-fixes). - iwlwifi: Fix -EIO error code that is never returned (git-fixes). - iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes). - livepatch: Do not block removal of patches that are safe to unload (bsc#1071995). - lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes). - media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes). - media: hdpvr: initialize dev->worker at hdpvr_register_videodev (git-fixes). - memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes). - mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes). - mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes). - mmc: host: Return an error when ->enable_sdio_irq() ops is missing (git-fixes). - mmc: mmci: stm32: correctly check all elements of sg list (git-fixes). - mmc: mmci_sdmmc: Replace sg_dma_xxx macros (git-fixes). - mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes). - mtd: onenand: Check for error irq (git-fixes). - mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes). - mtd: rawnand: gpmi: fix controller timings setting (git-fixes). - mwl8k: Fix a double Free in mwl8k_probe_hw (git-fixes). - net: asix: add proper error handling of usb read errors (git-fixes). - net: mcs7830: handle usb read errors properly (git-fixes). - net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes). - nfc: nci: add flush_workqueue to prevent uaf (git-fixes). - power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes). - power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes). - power: supply: axp20x_battery: properly report current when discharging (git-fixes). - power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes). - power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes). - power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes). - power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes). - powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes). - powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes). - ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413). - random: check for signal_pending() outside of need_resched() check (git-fixes). - ray_cs: Check ioremap return value (git-fixes). - regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes). - rtc: check if __rtc_read_time was successful (git-fixes). - rtc: wm8350: Handle error for wm8350_register_irq (git-fixes). - scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes). - scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes). - scsi: mpt3sas: Page fault in reply q processing (git-fixes). - scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825). - spi: Fix erroneous sgs value with min_t() (git-fixes). - spi: Fix invalid sgs value (git-fixes). - spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes). - spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes). - spi: mxic: Fix the transmit path (git-fixes). - spi: tegra20: Use of_device_get_match_data() (git-fixes). - staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes). - vgacon: Propagate console boot parameters before calling `vc_resize' (bsc#1152489) - video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes). - video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes). - video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes). - video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes). - video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes). - video: fbdev: udlfb: properly check endpoint type (bsc#1152489) - video: fbdev: w100fb: Reset global state (git-fixes). - virtio_console: break out of buf poll on remove (git-fixes). - virtio_console: eliminate anonymous module_init & module_exit (git-fixes). - w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes). - x86/pm: Save the MSR validity status at context setup (bsc#1198400). - x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes). - x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1198400). - xen/blkfront: fix comment for need_copy (git-fixes). - xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556). - xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556). - xen: fix is_xen_pmu() (git-fixes). - xhci: fix runtime PM imbalance in USB2 resume (git-fixes). - xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).
Patchnames: SUSE-2022-1676,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1676,openSUSE-SLE-15.3-2022-1676
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/1028340 self
https://bugzilla.suse.com/1065729 self
https://bugzilla.suse.com/1071995 self
https://bugzilla.suse.com/1121726 self
https://bugzilla.suse.com/1137728 self
https://bugzilla.suse.com/1152489 self
https://bugzilla.suse.com/1177028 self
https://bugzilla.suse.com/1179878 self
https://bugzilla.suse.com/1182073 self
https://bugzilla.suse.com/1183723 self
https://bugzilla.suse.com/1187055 self
https://bugzilla.suse.com/1191647 self
https://bugzilla.suse.com/1193556 self
https://bugzilla.suse.com/1193842 self
https://bugzilla.suse.com/1195926 self
https://bugzilla.suse.com/1196018 self
https://bugzilla.suse.com/1196114 self
https://bugzilla.suse.com/1196367 self
https://bugzilla.suse.com/1196514 self
https://bugzilla.suse.com/1196639 self
https://bugzilla.suse.com/1196942 self
https://bugzilla.suse.com/1197157 self
https://bugzilla.suse.com/1197391 self
https://bugzilla.suse.com/1197656 self
https://bugzilla.suse.com/1197660 self
https://bugzilla.suse.com/1197914 self
https://bugzilla.suse.com/1197926 self
https://bugzilla.suse.com/1198217 self
https://bugzilla.suse.com/1198330 self
https://bugzilla.suse.com/1198400 self
https://bugzilla.suse.com/1198413 self
https://bugzilla.suse.com/1198437 self
https://bugzilla.suse.com/1198448 self
https://bugzilla.suse.com/1198484 self
https://bugzilla.suse.com/1198515 self
https://bugzilla.suse.com/1198516 self
https://bugzilla.suse.com/1198660 self
https://bugzilla.suse.com/1198742 self
https://bugzilla.suse.com/1198825 self
https://bugzilla.suse.com/1199012 self
https://bugzilla.suse.com/1199024 self
https://www.suse.com/security/cve/CVE-2020-27835/ self
https://www.suse.com/security/cve/CVE-2021-0707/ self
https://www.suse.com/security/cve/CVE-2021-20292/ self
https://www.suse.com/security/cve/CVE-2021-20321/ self
https://www.suse.com/security/cve/CVE-2021-38208/ self
https://www.suse.com/security/cve/CVE-2021-4154/ self
https://www.suse.com/security/cve/CVE-2022-0812/ self
https://www.suse.com/security/cve/CVE-2022-1158/ self
https://www.suse.com/security/cve/CVE-2022-1280/ self
https://www.suse.com/security/cve/CVE-2022-1353/ self
https://www.suse.com/security/cve/CVE-2022-1419/ self
https://www.suse.com/security/cve/CVE-2022-1516/ self
https://www.suse.com/security/cve/CVE-2022-28356/ self
https://www.suse.com/security/cve/CVE-2022-28748/ self
https://www.suse.com/security/cve/CVE-2022-28893/ self
https://www.suse.com/security/cve/CVE-2022-29156/ self
https://www.suse.com/security/cve/CVE-2020-27835 external
https://bugzilla.suse.com/1179878 external
https://www.suse.com/security/cve/CVE-2021-0707 external
https://bugzilla.suse.com/1198437 external
https://bugzilla.suse.com/1199332 external
https://www.suse.com/security/cve/CVE-2021-20292 external
https://bugzilla.suse.com/1183723 external
https://www.suse.com/security/cve/CVE-2021-20321 external
https://bugzilla.suse.com/1191647 external
https://www.suse.com/security/cve/CVE-2021-38208 external
https://bugzilla.suse.com/1187055 external
https://www.suse.com/security/cve/CVE-2021-4154 external
https://bugzilla.suse.com/1193842 external
https://bugzilla.suse.com/1194461 external
https://www.suse.com/security/cve/CVE-2022-0812 external
https://bugzilla.suse.com/1196639 external
https://www.suse.com/security/cve/CVE-2022-1158 external
https://bugzilla.suse.com/1197660 external
https://bugzilla.suse.com/1198133 external
https://www.suse.com/security/cve/CVE-2022-1280 external
https://bugzilla.suse.com/1197914 external
https://bugzilla.suse.com/1198590 external
https://www.suse.com/security/cve/CVE-2022-1353 external
https://bugzilla.suse.com/1198516 external
https://bugzilla.suse.com/1212293 external
https://www.suse.com/security/cve/CVE-2022-1419 external
https://bugzilla.suse.com/1198742 external
https://bugzilla.suse.com/1201655 external
https://bugzilla.suse.com/1203034 external
https://www.suse.com/security/cve/CVE-2022-1516 external
https://bugzilla.suse.com/1199012 external
https://www.suse.com/security/cve/CVE-2022-28356 external
https://bugzilla.suse.com/1197391 external
https://www.suse.com/security/cve/CVE-2022-28748 external
https://bugzilla.suse.com/1196018 external
https://www.suse.com/security/cve/CVE-2022-28893 external
https://bugzilla.suse.com/1198330 external
https://www.suse.com/security/cve/CVE-2022-29156 external
https://bugzilla.suse.com/1198515 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-27835: Fixed a use after free vulnerability in infiniband hfi1 driver in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2021-0707: Fixed a use after free vulnerability in dma_buf_release of dma-buf.c, which may lead to local escalation of privilege with no additional execution privileges needed (bnc#1198437).\n- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).\n- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).\n- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).\n- CVE-2021-4154: Fixed a use-after-free vulnerability in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c, allowing a local privilege escalation by an attacker with user privileges by exploiting the fsconfig syscall parameter, leading to a container breakout and a denial of service on the system (bnc#1193842).\n- CVE-2022-0812: Fixed information leak when a file is read from RDMA (bsc#1196639)\n- CVE-2022-1158: Fixed a vulnerability in the kvm module that may lead to a use-after-free write or denial of service (bsc#1197660).\n- CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914).\n- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516).\n- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).\n- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).\n- CVE-2022-28356: Fixed a refcount leak bug in net/llc/af_llc.c (bnc#1197391).\n- CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018).\n- CVE-2022-28893: Fixed a use after free vulnerability in inet_put_port where some sockets are not closed before xs_xprt_free() (bsc#1198330).\n- CVE-2022-29156: Fixed a double free vulnerability related to rtrs_clt_dev_release.ate (jsc#SLE-15176 bsc#1198515).\n\nThe following non-security bugs were fixed:\n\n- ACPI/APEI: Limit printable size of BERT table data (git-fixes).\n- ACPI: processor idle: Check for architectural support for LPI (git-fixes).\n- ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes).\n- ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes).\n- ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes).\n- ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes).\n- ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes).\n- ALSA: pcm: Test for \u0027silence\u0027 field in struct \u0027pcm_format_data\u0027 (git-fixes).\n- ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes).\n- ALSA: usb-audio: Increase max buffer size (git-fixes).\n- ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes).\n- ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes).\n- ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes).\n- ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes).\n- ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes).\n- ASoC: soc-compress: Change the check for codec_dai (git-fixes).\n- ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes).\n- ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes).\n- ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes).\n- Bluetooth: Fix use after free in hci_send_acl (git-fixes).\n- Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes).\n- Bluetooth: hci_serdev: call init_rwsem() before p-\u003eopen() (git-fixes).\n- Documentation: add link to stable release candidate tree (git-fixes).\n- HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes).\n- IB/hfi1: Allow larger MTU without AIP (jsc#SLE-13208).\n- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).\n- KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes).\n- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).\n- PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes).\n- PCI: aardvark: Fix support for MSI interrupts (git-fixes).\n- PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes).\n- PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes).\n- PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes).\n- PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes).\n- RDMA/core: Set MR type in ib_reg_user_mr (jsc#SLE-8449).\n- RDMA/mlx5: Add a missing update of cache-\u003elast_add (jsc#SLE-15175).\n- RDMA/mlx5: Do not remove cache MRs when a delay is needed (jsc#SLE-15175).\n- RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (jsc#SLE-15175).\n- SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() (git-fixes).\n- SUNRPC: Fix the svc_deferred_event trace class (git-fixes).\n- SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes).\n- SUNRPC: Handle low memory situations in call_status() (git-fixes).\n- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).\n- USB: serial: pl2303: add IBM device IDs (git-fixes).\n- USB: serial: simple: add Nokia phone driver (git-fixes).\n- USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).\n- USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).\n- USB: dwc3: omap: fix \u0027unbalanced disables for smps10_out1\u0027 on omap5evm (git-fixes).\n- USB: gadget: uvc: Fix crash when encoding data for usb request (git-fixes).\n- adm8211: fix error return code in adm8211_probe() (git-fixes).\n- arm64/sve: Use correct size when reinitialising SVE state (git-fixes)\n- arm64: clear_page() shouldn\u0027t use DC ZVA when DCZID_EL0.DZP == 1 (git-fixes)\n- arm64: dts: allwinner: h5: NanoPI Neo 2: Fix ethernet node (git-fixes)\n- arm64: dts: allwinner: orangepi-zero-plus: fix PHY mode (git-fixes)\n- arm64: dts: exynos: correct GIC CPU interfaces address range on (git-fixes)\n- arm64: dts: ls1028a: fix memory node (git-fixes)\n- arm64: dts: ls1028a: fix node name for the sysclk (git-fixes)\n- arm64: dts: lx2160a: fix scl-gpios property name (git-fixes)\n- arm64: dts: marvell: armada-37xx: Extend PCIe MEM space (git-fixes)\n- arm64: dts: marvell: armada-37xx: Fix reg for standard variant of (git-fixes)\n- arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes)\n- arm64: dts: rockchip: Fix GPU register width for RK3328 (git-fixes)\n- arm64: dts: rockchip: remove mmc-hs400-enhanced-strobe from (git-fixes)\n- arm64: dts: zii-ultra: fix 12V_MAIN voltage (git-fixes)\n- arm64: head: avoid over-mapping in map_memory (git-fixes)\n- ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes).\n- ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes).\n- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).\n- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).\n- ath5k: fix building with LEDS=m (git-fixes).\n- ath9k: Fix usage of driver-private space in tx_info (git-fixes).\n- ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes).\n- ath9k_htc: fix uninit value bugs (git-fixes).\n- bareudp: use ipv6_mod_enabled to check if IPv6 enabled (jsc#SLE-15172).\n- bfq: Avoid merging queues with different parents (bsc#1197926).\n- bfq: Drop pointless unlock-lock pair (bsc#1197926).\n- bfq: Get rid of __bio_blkcg() usage (bsc#1197926).\n- bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926).\n- bfq: Remove pointless bfq_init_rq() calls (bsc#1197926).\n- bfq: Split shared queues on move between cgroups (bsc#1197926).\n- bfq: Track whether bfq_group is still online (bsc#1197926).\n- bfq: Update cgroup information before merging bio (bsc#1197926).\n- block: Drop leftover references to RQF_SORTED (bsc#1182073).\n- bnx2x: fix napi API usage sequence (bsc#1198217).\n- bpf: Resolve to prog-\u003eaux-\u003edst_prog-\u003etype only for BPF_PROG_TYPE_EXT (git-fixes bsc#1177028).\n- brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes).\n- brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes).\n- brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes).\n- brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes).\n- carl9170: fix missing bit-wise or operator for tx_params (git-fixes).\n- cfg80211: hold bss_lock while updating nontrans_list (git-fixes).\n- cifs: fix bad fids sent over wire (bsc#1197157).\n- clk: Enforce that disjoints limits are invalid (git-fixes).\n- clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes).\n- direct-io: clean up error paths of do_blockdev_direct_IO (bsc#1197656).\n- direct-io: defer alignment check until after the EOF check (bsc#1197656).\n- direct-io: do not force writeback for reads beyond EOF (bsc#1197656).\n- dma-debug: fix return value of __setup handlers (git-fixes).\n- dma: at_xdmac: fix a missing check on list iterator (git-fixes).\n- dmaengine: Revert \u0027dmaengine: shdma: Fix runtime PM imbalance on error\u0027 (git-fixes).\n- dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes).\n- dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes).\n- dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes).\n- dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes).\n- drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes).\n- drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes).\n- drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes).\n- drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes).\n- drm/amd: Add USBC connector ID (git-fixes).\n- drm/amdgpu: Fix recursive locking warning (git-fixes).\n- drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes).\n- drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes).\n- drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes).\n- drm/amdkfd: make CRAT table missing message informational only (git-fixes).\n- drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes).\n- drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes).\n- drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes).\n- drm/edid: Do not clear formats if using deep color (git-fixes).\n- drm/edid: check basic audio support on CEA extension block (git-fixes).\n- drm/i915/gem: Flush coherency domains on first set-domain-ioctl (git-fixes).\n- drm/i915: Call i915_globals_exit() if pci_register_device() fails (git-fixes).\n- drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes).\n- drm/mediatek: Add AAL output size configuration (git-fixes).\n- drm/mediatek: Fix aal size config (git-fixes).\n- drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes).\n- drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes).\n- drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).\n- drm: Add orientation quirk for GPD Win Max (git-fixes).\n- drm: add a locked version of drm_is_current_master (bsc#1197914).\n- drm: add a locked version of drm_is_current_master (bsc#1197914).\n- drm: drm_file struct kABI compatibility workaround (bsc#1197914).\n- drm: drm_file struct kABI compatibility workaround (bsc#1197914).\n- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).\n- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).\n- drm: serialize drm_file.master with a new spinlock (bsc#1197914).\n- drm: serialize drm_file.master with a new spinlock (bsc#1197914).\n- drm: use the lookup lock in drm_is_current_master (bsc#1197914).\n- drm: use the lookup lock in drm_is_current_master (bsc#1197914).\n- e1000e: Fix possible overflow in LTR decoding (git-fixes).\n- fibmap: Reject negative block numbers (bsc#1198448).\n- fibmap: Use bmap instead of -\u003ebmap method in ioctl_fibmap (bsc#1198448).\n- firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes).\n- gpiolib: acpi: use correct format characters (git-fixes).\n- gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes).\n- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).\n- i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes).\n- ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes).\n- ipmi: Move remove_work to dedicated workqueue (git-fixes).\n- ipmi: bail out if init_srcu_struct fails (git-fixes).\n- iwlwifi: Fix -EIO error code that is never returned (git-fixes).\n- iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes).\n- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).\n- lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes).\n- media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes).\n- media: hdpvr: initialize dev-\u003eworker at hdpvr_register_videodev (git-fixes).\n- memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes).\n- mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes).\n- mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes).\n- mmc: host: Return an error when -\u003eenable_sdio_irq() ops is missing (git-fixes).\n- mmc: mmci: stm32: correctly check all elements of sg list (git-fixes).\n- mmc: mmci_sdmmc: Replace sg_dma_xxx macros (git-fixes).\n- mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes).\n- mtd: onenand: Check for error irq (git-fixes).\n- mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes).\n- mtd: rawnand: gpmi: fix controller timings setting (git-fixes).\n- mwl8k: Fix a double Free in mwl8k_probe_hw (git-fixes).\n- net: asix: add proper error handling of usb read errors (git-fixes).\n- net: mcs7830: handle usb read errors properly (git-fixes).\n- net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes).\n- nfc: nci: add flush_workqueue to prevent uaf (git-fixes).\n- power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes).\n- power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes).\n- power: supply: axp20x_battery: properly report current when discharging (git-fixes).\n- power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes).\n- power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes).\n- power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes).\n- power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes).\n- powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes).\n- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).\n- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).\n- random: check for signal_pending() outside of need_resched() check (git-fixes).\n- ray_cs: Check ioremap return value (git-fixes).\n- regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes).\n- rtc: check if __rtc_read_time was successful (git-fixes).\n- rtc: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).\n- scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes).\n- scsi: mpt3sas: Page fault in reply q processing (git-fixes).\n- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).\n- spi: Fix erroneous sgs value with min_t() (git-fixes).\n- spi: Fix invalid sgs value (git-fixes).\n- spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes).\n- spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes).\n- spi: mxic: Fix the transmit path (git-fixes).\n- spi: tegra20: Use of_device_get_match_data() (git-fixes).\n- staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes).\n- vgacon: Propagate console boot parameters before calling `vc_resize\u0027 (bsc#1152489)\n- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes).\n- video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes).\n- video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes).\n- video: fbdev: udlfb: properly check endpoint type (bsc#1152489)\n- video: fbdev: w100fb: Reset global state (git-fixes).\n- virtio_console: break out of buf poll on remove (git-fixes).\n- virtio_console: eliminate anonymous module_init \u0026 module_exit (git-fixes).\n- w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes).\n- x86/pm: Save the MSR validity status at context setup (bsc#1198400).\n- x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1198400).\n- xen/blkfront: fix comment for need_copy (git-fixes).\n- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556).\n- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556).\n- xen: fix is_xen_pmu() (git-fixes).\n- xhci: fix runtime PM imbalance in USB2 resume (git-fixes).\n- xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-1676,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1676,openSUSE-SLE-15.3-2022-1676",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1676-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2022:1676-1",
        "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221676-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2022:1676-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1028340",
        "url": "https://bugzilla.suse.com/1028340"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1121726",
        "url": "https://bugzilla.suse.com/1121726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1137728",
        "url": "https://bugzilla.suse.com/1137728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177028",
        "url": "https://bugzilla.suse.com/1177028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179878",
        "url": "https://bugzilla.suse.com/1179878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1182073",
        "url": "https://bugzilla.suse.com/1182073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183723",
        "url": "https://bugzilla.suse.com/1183723"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187055",
        "url": "https://bugzilla.suse.com/1187055"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191647",
        "url": "https://bugzilla.suse.com/1191647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193556",
        "url": "https://bugzilla.suse.com/1193556"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193842",
        "url": "https://bugzilla.suse.com/1193842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195926",
        "url": "https://bugzilla.suse.com/1195926"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196018",
        "url": "https://bugzilla.suse.com/1196018"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196114",
        "url": "https://bugzilla.suse.com/1196114"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196367",
        "url": "https://bugzilla.suse.com/1196367"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196514",
        "url": "https://bugzilla.suse.com/1196514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196639",
        "url": "https://bugzilla.suse.com/1196639"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196942",
        "url": "https://bugzilla.suse.com/1196942"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197157",
        "url": "https://bugzilla.suse.com/1197157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197391",
        "url": "https://bugzilla.suse.com/1197391"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197656",
        "url": "https://bugzilla.suse.com/1197656"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197660",
        "url": "https://bugzilla.suse.com/1197660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197914",
        "url": "https://bugzilla.suse.com/1197914"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197926",
        "url": "https://bugzilla.suse.com/1197926"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198217",
        "url": "https://bugzilla.suse.com/1198217"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198330",
        "url": "https://bugzilla.suse.com/1198330"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198400",
        "url": "https://bugzilla.suse.com/1198400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198413",
        "url": "https://bugzilla.suse.com/1198413"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198437",
        "url": "https://bugzilla.suse.com/1198437"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198448",
        "url": "https://bugzilla.suse.com/1198448"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198484",
        "url": "https://bugzilla.suse.com/1198484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198515",
        "url": "https://bugzilla.suse.com/1198515"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198516",
        "url": "https://bugzilla.suse.com/1198516"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198660",
        "url": "https://bugzilla.suse.com/1198660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198742",
        "url": "https://bugzilla.suse.com/1198742"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198825",
        "url": "https://bugzilla.suse.com/1198825"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199012",
        "url": "https://bugzilla.suse.com/1199012"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1199024",
        "url": "https://bugzilla.suse.com/1199024"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-27835 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-27835/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-0707 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-0707/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20292 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20292/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-20321 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-20321/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38208 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38208/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4154 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4154/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0812 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0812/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1158 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1158/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1280 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1280/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1353 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1353/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1419 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1419/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1516 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28356 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28356/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28748 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28748/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28893 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28893/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-29156 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-29156/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2022-05-16T08:13:49Z",
      "generator": {
        "date": "2022-05-16T08:13:49Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2022:1676-1",
      "initial_release_date": "2022-05-16T08:13:49Z",
      "revision_history": [
        {
          "date": "2022-05-16T08:13:49Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
                  "product_id": "kernel-devel-azure-5.3.18-150300.38.56.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.3.18-150300.38.56.1.noarch",
                "product": {
                  "name": "kernel-source-azure-5.3.18-150300.38.56.1.noarch",
                  "product_id": "kernel-source-azure-5.3.18-150300.38.56.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "kernel-azure-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "kernel-azure-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "kernel-azure-devel-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "kernel-azure-extra-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "kernel-azure-optional-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "kernel-syms-azure-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.3.18-150300.38.56.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kernel-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.3.18-150300.38.56.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.3.18-150300.38.56.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.3.18-150300.38.56.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.3.18-150300.38.56.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.3.18-150300.38.56.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kernel-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.3.18-150300.38.56.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.3.18-150300.38.56.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.3.18-150300.38.56.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-27835",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-27835"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-27835",
          "url": "https://www.suse.com/security/cve/CVE-2020-27835"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179878 for CVE-2020-27835",
          "url": "https://bugzilla.suse.com/1179878"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-27835"
    },
    {
      "cve": "CVE-2021-0707",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-0707"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In dma_buf_release of dma-buf.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-155756045References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-0707",
          "url": "https://www.suse.com/security/cve/CVE-2021-0707"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198437 for CVE-2021-0707",
          "url": "https://bugzilla.suse.com/1198437"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199332 for CVE-2021-0707",
          "url": "https://bugzilla.suse.com/1199332"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-0707"
    },
    {
      "cve": "CVE-2021-20292",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20292"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20292",
          "url": "https://www.suse.com/security/cve/CVE-2021-20292"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1183723 for CVE-2021-20292",
          "url": "https://bugzilla.suse.com/1183723"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-20292"
    },
    {
      "cve": "CVE-2021-20321",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-20321"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-20321",
          "url": "https://www.suse.com/security/cve/CVE-2021-20321"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191647 for CVE-2021-20321",
          "url": "https://bugzilla.suse.com/1191647"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-20321"
    },
    {
      "cve": "CVE-2021-38208",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38208"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38208",
          "url": "https://www.suse.com/security/cve/CVE-2021-38208"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187055 for CVE-2021-38208",
          "url": "https://bugzilla.suse.com/1187055"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38208"
    },
    {
      "cve": "CVE-2021-4154",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4154"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel\u0027s cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4154",
          "url": "https://www.suse.com/security/cve/CVE-2021-4154"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193842 for CVE-2021-4154",
          "url": "https://bugzilla.suse.com/1193842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194461 for CVE-2021-4154",
          "url": "https://bugzilla.suse.com/1194461"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-4154"
    },
    {
      "cve": "CVE-2022-0812",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0812"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An information leak flaw was found in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c in the Linux Kernel. This flaw allows an attacker with normal user privileges to leak kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0812",
          "url": "https://www.suse.com/security/cve/CVE-2022-0812"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196639 for CVE-2022-0812",
          "url": "https://bugzilla.suse.com/1196639"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-0812"
    },
    {
      "cve": "CVE-2022-1158",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1158"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in KVM. When updating a guest\u0027s page table entry, vm_pgoff was improperly used as the offset to get the page\u0027s pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1158",
          "url": "https://www.suse.com/security/cve/CVE-2022-1158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197660 for CVE-2022-1158",
          "url": "https://bugzilla.suse.com/1197660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198133 for CVE-2022-1158",
          "url": "https://bugzilla.suse.com/1198133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1158"
    },
    {
      "cve": "CVE-2022-1280",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1280"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1280",
          "url": "https://www.suse.com/security/cve/CVE-2022-1280"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197914 for CVE-2022-1280",
          "url": "https://bugzilla.suse.com/1197914"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198590 for CVE-2022-1280",
          "url": "https://bugzilla.suse.com/1198590"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1280"
    },
    {
      "cve": "CVE-2022-1353",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1353"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1353",
          "url": "https://www.suse.com/security/cve/CVE-2022-1353"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198516 for CVE-2022-1353",
          "url": "https://bugzilla.suse.com/1198516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212293 for CVE-2022-1353",
          "url": "https://bugzilla.suse.com/1212293"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1353"
    },
    {
      "cve": "CVE-2022-1419",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1419"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1419",
          "url": "https://www.suse.com/security/cve/CVE-2022-1419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198742 for CVE-2022-1419",
          "url": "https://bugzilla.suse.com/1198742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201655 for CVE-2022-1419",
          "url": "https://bugzilla.suse.com/1201655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203034 for CVE-2022-1419",
          "url": "https://bugzilla.suse.com/1203034"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1419"
    },
    {
      "cve": "CVE-2022-1516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1516",
          "url": "https://www.suse.com/security/cve/CVE-2022-1516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199012 for CVE-2022-1516",
          "url": "https://bugzilla.suse.com/1199012"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1516"
    },
    {
      "cve": "CVE-2022-28356",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28356"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28356",
          "url": "https://www.suse.com/security/cve/CVE-2022-28356"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197391 for CVE-2022-28356",
          "url": "https://bugzilla.suse.com/1197391"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28356"
    },
    {
      "cve": "CVE-2022-28748",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28748"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28748",
          "url": "https://www.suse.com/security/cve/CVE-2022-28748"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196018 for CVE-2022-28748",
          "url": "https://bugzilla.suse.com/1196018"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28748"
    },
    {
      "cve": "CVE-2022-28893",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28893"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28893",
          "url": "https://www.suse.com/security/cve/CVE-2022-28893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198330 for CVE-2022-28893",
          "url": "https://bugzilla.suse.com/1198330"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28893"
    },
    {
      "cve": "CVE-2022-29156",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-29156"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-29156",
          "url": "https://www.suse.com/security/cve/CVE-2022-29156"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198515 for CVE-2022-29156",
          "url": "https://bugzilla.suse.com/1198515"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.56.1.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.56.1.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.56.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-05-16T08:13:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-29156"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…